Skip to content
View saw-your-packet's full-sized avatar

Block or report saw-your-packet

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
saw-your-packet/README.md

/whoami

Hello there and thanks for your interest! Here are some things about me:

  • 😄 I go by Eduard or saw-your-packet
  • 🔭 Doing cloud research with a focus on the offensive part of it
  • 🌩️ My areas of expertise are cloud security, web application penetration testing and security source code review
  • 📫 How to reach me: LinkedIn or Twitter
  • 🤓 You can follow my work on HackToDef.com and OffensAI.com/blog

Tools and resources

Minimal Rogue OpenID Connect (OIDC) Provider implementation in Python for AWS role assumption using OIDC authentication.

EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.

A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where we scanned 20k+ public AMIs.

Resources for AWS post-exploitation scenarios where you have the permission ssm:SendCommand, but you can't use the AWS-RunPowerShellScript or AWS-RunShellScript documents.

Talks

Some of my talks:

Pinned Loading

  1. EC2StepShell EC2StepShell Public

    EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.

    Python 68 6

  2. CloudShovel CloudShovel Public

    A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where we scanned 20k+ public AMIs.

    Python 113 8