01Automated IAM enumeration and privilege escalation path discovery
02Lambda function and SSM command execution exploitation guides
03Integration workflows for tools like Pacu, Prowler, and ScoutSuite
041 GitHub stars
05EC2 metadata SSRF exploitation patterns for IMDSv1 and IMDSv2
06S3 bucket discovery and misconfiguration auditing techniques