Skip to content

[pull] main from Hacking-the-Cloud:main#18

Open
pull[bot] wants to merge 763 commits intoagnivesh:mainfrom
Hacking-the-Cloud:main
Open

[pull] main from Hacking-the-Cloud:main#18
pull[bot] wants to merge 763 commits intoagnivesh:mainfrom
Hacking-the-Cloud:main

Conversation

@pull
Copy link
Copy Markdown

@pull pull bot commented Dec 2, 2021

See Commits and Changes for more details.


Created by pull[bot]

Can you help keep this open source service alive? 💖 Please sponsor : )

@pull pull bot added the ⤵️ pull label Dec 2, 2021
Frichetten and others added 29 commits January 21, 2024 11:59
…cles

Merged 2 user data priv esc articles into one
…_ec2_priv_esc

Added intro to local_ec2_priv_esc_through_user_data
…trust_policy_article

Added article on role trust policies with wildcard principal element
Added an admonition about HackTricks Cloud still plagiarizing people's work
…titles

Added [Deprecated] to old methods
Frichetten and others added 30 commits January 25, 2026 20:20
Added detailed instructions for extracting IAM credentials via AWS Console service endpoints, including manual and automated methods.
Update claude_magic_string_denial_of_service.md
Add Console /tb/creds endpoint credential extraction technique
…am_console_article

Made some minor tweaks to get_iam_creds_from_console_session
…-merge-remnants

Remove scheduled merge workflow remnants
Add a new exploitation writeup (content/gcp/exploitation/gcp-cloud-workstations-container-breakout.md) that documents a container-to-host breakout via a mounted Docker socket, steps to obtain VM service account tokens from the metadata service, persistence and network pivot techniques, and recommended countermeasures. Also adds macOS .DS_Store files (should be ignored or removed via .gitignore).
Added a note about the gcp-workstations-containerEscapeScript tool and included a screenshot.
…cape

Add Cloud Workstations Privilege Escalation & Container Breakout
…ure-detection

Add article: detect public resource exposure via session policy error messages
…p_banner

Add fwd:cloudsec EU 2026 advert
Covers wildcard-based IAM policy obfuscation techniques that grant
admin-equivalent access while evading name-based policy detections.
Includes detection guidance and example policies.

Fixes #419
Add article: obfuscated admin IAM policies using action wildcards
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment