This can be used an easy way of simulating a cloud and container compromise - to trigger detections
It is inspired by Florian Roth's APTSimulator
Do not run this on production systems as it can reduce their security
Copy the files to a Linux system and run:
- chmod +x ./setup.sh
- ./setup.sh