ACRTP 14
- Pwned Labs : Execute and Indetify Credential Abuse in AWS
- Pwned Labs : Assume Privileged Role with External ID
- Pwned Labs : Access Secrets with S3 bucket Versioning
- Pwned Labs : S3 Bucket Brute Force to Breach
- Pwned Labs : Exploit Weak Bucket Policies for Privileged Access
- Pwned Labs : Path Traversal to AWS credentials to S3
- Pwned Labs : Hunt for Secrets in Git Repos Walkthrough
- Pwned Labs : Uncover Secrets in CodeCommit and Docker Walkthrough
- Pwned Labs : Leverage Insecure Storage and Backups for Profit Walkthrough
- Pwned Labs : Azure Blob Container to Initial Access Walkthrough
- Pwned Labs : SSRF to Pwned Walkthrough
- Pwned Labs : AWS S3 Enumeration Basics
- Pwned Labs : Identify the AWS Account ID from a Public S3 Bucket
- Pwned Labs : Breach in the Cloud Writeup