AWS

Privilege Escalation Series 2: lambda functions

Part 2 of the Privilege Escalation Series. This time exploiting a Lambda Function and granting Admin Access

Exploit Weak Bucket Policies for Privileged Access

Solving Labs on PwnedLabs: Exploit Weak Bucket Policies for Privileged Access

AWS Reconnaissance from the outside

Post about the possibilties to do Recon on AWS from the outside

Smells like honey - like honey token

An short description on how to create and use an honey token