File tree
79 files changed
+81
-81
lines changed- aws
- avoiding-detection
- guardduty-pentest
- guardduty-tor-client
- modify-guardduty-config
- steal-keys-undetected
- capture_the_flag/cicdont
- deprecated
- stealth_perm_enum
- whoami
- enumeration
- account_id_from_ec2
- account_id_from_s3_bucket
- brute_force_iam_permissions
- bypass_cognito_user_enumeration_controls
- discover_secrets_in_public_aims
- enum_iam_user_role
- enumerate_principal_arn_from_unique_id
- enumerate_root_email_from_console
- get-account-id-from-keys
- loot_public_ebs_snapshots
- whoami
- exploitation
- Misconfigured_Resource-Based_Policies
- exploit_amplify_vulnerability_in_same_account_scenario
- exploiting_misconfigured_gitlab_oidc_aws_iam_roles
- misconfigured_ecr_resource_policy
- misconfigured_iam_role_trust_policy_wildcard_principal
- abusing-container-registry
- cognito_identity_pool_excessive_privileges
- cognito_user_self_signup
- ec2-metadata-ssrf
- iam_privilege_escalation
- lambda-steal-iam-credentials
- local_ec2_priv_esc_through_user_data
- orphaned_cloudfront_or_dns_takeover_via_s3
- route53_modification_privilege_escalation
- s3-bucket-replication-exfiltration
- s3_server_access_logs
- s3_streaming_copy
- general-knowledge
- aws_cli_tips_and_tricks
- aws_organizations_defaults
- block-expensive-actions-with-scps
- connection-tracking
- iam-key-identifiers
- intro_metadata_service
- introduction_user_data
- using_stolen_iam_credentials
- post_exploitation
- create_a_console_session_from_iam_credentials
- download_tools_and_exfiltrate_data_with_aws_cli
- get_iam_creds_from_console_session
- iam_persistence
- intercept_ssm_communications
- lambda_persistence
- role-chain-juggling
- run_shell_commands_on_ec2
- s3_acl_persistence
- survive_access_key_deletion_with_sts_getfederationtoken
- user_data_script_persistence
- azure
- abusing-managed-identities
- anonymous-blob-access
- enum_email_addresses
- run-command-abuse
- soft-deleted-blobs
- blog
- 2022_wrap-up
- 2023_wrap-up
- v2_new_look
- gcp
- capture_the_flag
- gcp-goat
- thunder_ctf
- enumeration
- enum_email_addresses
- enumerate_all_permissions
- enumerate_service_account_permissions
- exploitation/gcp_iam_privilege_escalation
- general-knowledge
- default-account-names
- gcp-buckets
- metadata_in_google_cloud_instances
- security-and-constraints
- terraform
- terraform_ansi_escape_evasion
- terraform_enterprise_metadata_service
Some content is hidden
Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.
79 files changed
+81
-81
lines changedLines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.
Lines changed: 1 addition & 1 deletion
Original file line number | Diff line number | Diff line change | |
---|---|---|---|
| |||
1 |
| - | |
| 1 | + | |
2 | 2 |
| |
3 | 3 |
| |
4 | 4 |
| |
|
Lines changed: 1 addition & 1 deletion
Original file line number | Diff line number | Diff line change | |
---|---|---|---|
| |||
1 |
| - | |
| 1 | + | |
2 | 2 |
| |
3 | 3 |
| |
4 | 4 |
| |
|
Lines changed: 1 addition & 1 deletion
Original file line number | Diff line number | Diff line change | |
---|---|---|---|
| |||
1 |
| - | |
| 1 | + | |
2 | 2 |
| |
3 | 3 |
| |
4 | 4 |
| |
|
0 commit comments