01Automated AWS metadata SSRF (IMDSv1 and IMDSv2) exploitation workflows
022,883 GitHub stars
03S3 bucket discovery, enumeration, and data exfiltration techniques
04IAM privilege escalation path discovery and permission enumeration
05Comprehensive guidance for using security tools like Pacu, Prowler, and ScoutSuite
06Lambda function exploitation and malicious code injection patterns