_|_| _| _|
_|_|_| _|_|_|_| _| _| _| _|_| _|_| _| _|_|_| _|_|_|
_| _| _| _| _| _|_| _|_|_|_| _|_|_|_| _| _|_| _| _|
_| _| _| _| _| _| _| _| _| _|_| _| _|
_|_|_| _|_|_|_| _|_|_| _| _|_|_| _| _| _|_|_| _| _|
Another Offensive project to harvest credentials using an ARM template deployment with a fancy UI
The initial idea is to lure the user into providing credentials required to deploy resources or a feature to Microsoft Azure
To do this the user needs to provide the credentials of a Service Principal or App Registration with permissions to deploy the resources.
In the background during deployment, the provided credentials are stored in a location of the malicious actor who is trying to lure the user.
Now that the credentials are leaked, these can be abused to hijack the subscription.
If you encounter any issues, or hae suggestions for improvements, feel free to open an Issue