Vajra icon indicating copy to clipboard operation
Vajra copied to clipboard

Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an intuitive web-based user interface built with the Python Flask...

Vajra - Your Weapon To Cloud


About Vajra

Vajra is a UI based tool with multiple techniques for attacking and enumerating in target's Azure environment.

The term Vajra refers to the Weapon of God Indra in Indian mythology (God of Thunder & Storms). Its connection to the cloud makes it a perfect name for the tool.

Vajra presently supports Azure and AWS Cloud environments, with plans to add support for Google Cloud Platform and certain OSINT in the future.

Following features are available at the moment:

  • Azure
    • Attacking
      1. OAuth Based Phishing (Illicit Consent Grant Attack)
        • Exfiltrate Data
        • Enumerate Environment
        • Deploy Backdoors
        • Send mails/Create Rules
      2. Password Spray
      3. Password Brute Force
    • Enumeration
      1. Users
      2. Subdomain
      3. Azure Ad
      4. Azure Services
    • Specific Service
      1. Storage Accounts
  • AWS
    • Attacking(In progress)
      1. Under Development
    • Enumeration
      1. IAM Enumeration
      2. S3 Scanner
      3. Under Development
    • Misconfiguration

Note: This tool have been tested in a environment which had around 3 Lakh principals like users, groups, enterprise application, etc.



It features an intuitive web-based user interface built with the Python Flask module for a better user experience.

About Author

Raunak Parmar is an information security professional whose areas of interest include web penetration testing, Azure/AWS security, source code review, scripting, and development.

He has 2+ years of experience in information security. Raunak likes to research new attack methodologies and create open-source tools that can be used during the Cloud Security assessments. He has worked extensively on Azure and AWS.

He is the author of Vajra and 365-Stealer an offensive cloud security tool. He has spoken in multiple conferences and local meetups.

readme-stats

Social Media Links

Installation

Docker

Pull the image file from dockerhub

docker pull tr0uble1/vajra   

Run Vajra with following and navigate to http://localhost

docker run -p 80:80 -d tr0uble1/vajra

Manually

Run the following command to install all the modules.

pip install -r requirements.txt

Once installed run the following to start the application.

python app.py

How to use Vajra?

A detailed usage guide is available on Documentation section of the Wiki.

Bugs and Feature Requests

Please raise an issue if you encounter a bug or have a feature request.

Contributing

If you want to contribute to a project and make it better, your help is very welcome.