[pull] main from Hacking-the-Cloud:main#18
Open
pull[bot] wants to merge 763 commits intoagnivesh:mainfrom
Open
[pull] main from Hacking-the-Cloud:main#18pull[bot] wants to merge 763 commits intoagnivesh:mainfrom
pull[bot] wants to merge 763 commits intoagnivesh:mainfrom
Conversation
…cles Merged 2 user data priv esc articles into one
…_ec2_priv_esc Added intro to local_ec2_priv_esc_through_user_data
…trust_policy_article Added article on role trust policies with wildcard principal element
Update/new branding
Fixing the logo for social cards
Updated background color of social cards
Updated banner image
Trying a thinner banner
Added new social card layout/style
Added an admonition about HackTricks Cloud still plagiarizing people's work
…titles Added [Deprecated] to old methods
Added smaller favicon
Updated HackTricks warning
…llm_cfr Nick.frichette/add ai llm cfr
Added detailed instructions for extracting IAM credentials via AWS Console service endpoints, including manual and automated methods.
Update claude_magic_string_denial_of_service.md
Add Console /tb/creds endpoint credential extraction technique
…am_console_article Made some minor tweaks to get_iam_creds_from_console_session
…eduler remove merge scheduler workflow
…-merge-remnants Remove scheduled merge workflow remnants
Add a new exploitation writeup (content/gcp/exploitation/gcp-cloud-workstations-container-breakout.md) that documents a container-to-host breakout via a mounted Docker socket, steps to obtain VM service account tokens from the metadata service, persistence and network pivot techniques, and recommended countermeasures. Also adds macOS .DS_Store files (should be ignored or removed via .gitignore).
Added a note about the gcp-workstations-containerEscapeScript tool and included a screenshot.
…cape Add Cloud Workstations Privilege Escalation & Container Breakout
…ure-detection Add article: detect public resource exposure via session policy error messages
Update main.html
…p_banner Add fwd:cloudsec EU 2026 advert
Covers wildcard-based IAM policy obfuscation techniques that grant admin-equivalent access while evading name-based policy detections. Includes detection guidance and example policies. Fixes #419
Add article: obfuscated admin IAM policies using action wildcards
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
See Commits and Changes for more details.
Created by
pull[bot]
Can you help keep this open source service alive? 💖 Please sponsor : )