AWS attack techniques across IAM, S3, and EC2.
IAM Abuse
AWS IAM exploitation techniques for privilege escalation and persistence.
Storage Abuse
AWS S3 bucket abuse and data exfiltration techniques.
Compute Abuse
AWS EC2, Lambda, and ECS abuse techniques.