01IAM permission enumeration and privilege escalation discovery
020 GitHub stars
03Persistence mechanism identification and track-covering techniques
04Automated security auditing workflows using Pacu and Prowler
05EC2 Instance Metadata Service (IMDSv1/v2) SSRF exploitation guides
06Resource-specific exploitation for S3, Lambda, and SSM