elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Last modified Size
Parent Directory -
1 of 31 - Course Roadmap .webm 2025-09-18 10:11 3.5M
2 of 31 - Cloud Resource Hijacking .webm 2025-09-18 10:11 3.8M
3 of 31 - Cloud IAM Broken Access Control and Privilege Escalation .webm 2025-09-18 10:11 7.6M
4 of 31 - Cloud IAM Broken Access Control Violations .webm 2025-09-18 10:11 3.9M
5 of 31 - Cloud Managed Roles as Anti-Patterns .webm 2025-09-18 10:11 2.5M
6 of 31 - AWS Managed Policy Resource Wildcard .webm 2025-09-18 10:11 13M
7 of 31 - Azure Role Assignment Subscription Scope .webm 2025-09-18 10:11 9.9M
8 of 31 - Google Cloud Project Level Role Binding .webm 2025-09-18 10:11 3.3M
9 of 31 - AWS Custom Policy Requirements .webm 2025-09-18 10:11 14M
10 of 31 - AWS Horizonal Access Control Policy Restrictions .webm 2025-09-18 10:11 8.2M
11 of 31 - Azure and Google Cloud Broken Access Control Restrictions .webm 2025-09-18 10:11 16M
12 of 31 - Finding IAM Policies with Broken Access Control .webm 2025-09-18 10:11 26M
13 of 31 - AWS IAM Access Analyzer Policy Analysis .webm 2025-09-18 10:11 24M
14 of 31 - AWS IAM Access Analyzer External Access .webm 2025-09-18 10:11 5.2M
15 of 31 - AWS IAM Access Analyzer Policy Generation .webm 2025-09-18 10:11 9.2M
16 of 31 - Microsoft Entra ID Permissions Management .webm 2025-09-18 10:11 3.2M
17 of 31 - Google Cloud IAM Policy Intelligence .webm 2025-09-18 10:11 11M
18 of 31 - Google Cloud Policy Analyzer Results .webm 2025-09-18 10:11 3.6M
19 of 31 - Google Cloud IAM Recommender .webm 2025-09-18 10:11 2.5M
20 of 31 - Using Large Language Models for IAM Policy Analysis .webm 2025-09-18 10:11 18M
21 of 31 - Relevant LLM Terminology .webm 2025-09-18 10:11 43M
22 of 31 - Applying LLMs to Security – Ineffective Use Cases .webm 2025-09-18 10:11 68M
23 of 31 - Applying LLMs to Security – Promising Use Cases .webm 2025-09-18 10:11 38M
24 of 31 - Explaining IAM Policy with an LLM .webm 2025-09-18 10:11 2.2M
25 of 31 - Creating IAM Policy with an LLM – No Context .webm 2025-09-18 10:11 4.3M
26 of 31 - Creating IAM Policy with an LLM – Some Context .webm 2025-09-18 10:11 5.3M
27 of 31 - IAM Policy LLM Hallucination – Bad Summary of Documentation .webm 2025-09-18 10:11 2.6M
28 of 31 - IAM Policy LLM Hallucination – Following Up on Responses .webm 2025-09-18 10:11 8.9M
29 of 31 - IAM Broken Access Control Summary .webm 2025-09-18 10:11 17M
30 of 31 - Broken Access Control and Policy Analysis .webm 2025-09-18 10:11 202M
31 of 31 - Lab 1.3 Summary Broken Access Control and Analysis .webm 2025-09-18 10:11 6.1M