01EC2 Metadata Service (IMDSv1 and IMDSv2) SSRF exploitation workflows
021 GitHub stars
03Automated IAM enumeration and Shadow Admin permission discovery
04S3 bucket discovery and misconfiguration assessment
05Integration with security tools like Pacu, Prowler, and SkyArk
06Lambda function code extraction and privilege escalation techniques