- ADCS Attack Series: Abusing ESC10 for Privilege Escalation via Misconfigured Registries
- ADCS Attack Series: Abusing ESC4 via Template ACLs for Privilege Escalation
- ADCS Attack Series: Abusing ESC9 for Privilege Escalation via Weak Certificate Mapping
- GCP Privilege Escalation: Abusing Function Admin Role for Full Project Takeover
- Abusing Compute Instance IAM Misconfigurations to Gain Privileges in GCP
- Stealing Cloud Function Access Tokens with Misconfigured IAM Policy [GCP]
- Payload Delivery with Azure Static Website and IPFS Dropper
- Configure Fireprox for IP Rotation using AWS API Gateway
- Adding Certificates to Postman & Burp Suite for API Testing
- Red Teaming in Cloud: Leverage Azure FrontDoor CDN for C2 Redirectors
☠️
Pinned Loading
-
google-cloud-pentest-toolkit
google-cloud-pentest-toolkit PublicA collection of Bash scripts for enumerating GCP environments to discover services, service accounts, IAM roles, storage buckets, compute instances, and more for internal cloud security assessments
Shell
-
nuclei-template-sap-services-checks
nuclei-template-sap-services-checks PublicSAP NetWeaver Service Detection
-
100-Projects-Challenge
100-Projects-Challenge Public💯 Projects from Sophomore to Senior year at AU | Resume: http://resume.github.io/?nairuzabulhul
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.