elhacker.INFO Downloads

[ índice de contenido ]

Copyright issues contact webmaster@elhacker.info
Icon  Name                                                                                                          Last modified      Size  
[Volver] Parent Directory - [VID] 1 of 31 - Course Roadmap .webm 2025-09-18 10:11 3.5M [VID] 2 of 31 - Cloud Resource Hijacking .webm 2025-09-18 10:11 3.8M [VID] 3 of 31 - Cloud IAM Broken Access Control and Privilege Escalation .webm 2025-09-18 10:11 7.6M [VID] 4 of 31 - Cloud IAM Broken Access Control Violations .webm 2025-09-18 10:11 3.9M [VID] 5 of 31 - Cloud Managed Roles as Anti-Patterns .webm 2025-09-18 10:11 2.5M [VID] 6 of 31 - AWS Managed Policy Resource Wildcard .webm 2025-09-18 10:11 13M [VID] 7 of 31 - Azure Role Assignment Subscription Scope .webm 2025-09-18 10:11 9.9M [VID] 8 of 31 - Google Cloud Project Level Role Binding .webm 2025-09-18 10:11 3.3M [VID] 9 of 31 - AWS Custom Policy Requirements .webm 2025-09-18 10:11 14M [VID] 10 of 31 - AWS Horizonal Access Control Policy Restrictions .webm 2025-09-18 10:11 8.2M [VID] 11 of 31 - Azure and Google Cloud Broken Access Control Restrictions .webm 2025-09-18 10:11 16M [VID] 12 of 31 - Finding IAM Policies with Broken Access Control .webm 2025-09-18 10:11 26M [VID] 13 of 31 - AWS IAM Access Analyzer Policy Analysis .webm 2025-09-18 10:11 24M [VID] 14 of 31 - AWS IAM Access Analyzer External Access .webm 2025-09-18 10:11 5.2M [VID] 15 of 31 - AWS IAM Access Analyzer Policy Generation .webm 2025-09-18 10:11 9.2M [VID] 16 of 31 - Microsoft Entra ID Permissions Management .webm 2025-09-18 10:11 3.2M [VID] 17 of 31 - Google Cloud IAM Policy Intelligence .webm 2025-09-18 10:11 11M [VID] 18 of 31 - Google Cloud Policy Analyzer Results .webm 2025-09-18 10:11 3.6M [VID] 19 of 31 - Google Cloud IAM Recommender .webm 2025-09-18 10:11 2.5M [VID] 20 of 31 - Using Large Language Models for IAM Policy Analysis .webm 2025-09-18 10:11 18M [VID] 21 of 31 - Relevant LLM Terminology .webm 2025-09-18 10:11 43M [VID] 22 of 31 - Applying LLMs to Security – Ineffective Use Cases .webm 2025-09-18 10:11 68M [VID] 23 of 31 - Applying LLMs to Security – Promising Use Cases .webm 2025-09-18 10:11 38M [VID] 24 of 31 - Explaining IAM Policy with an LLM .webm 2025-09-18 10:11 2.2M [VID] 25 of 31 - Creating IAM Policy with an LLM – No Context .webm 2025-09-18 10:11 4.3M [VID] 26 of 31 - Creating IAM Policy with an LLM – Some Context .webm 2025-09-18 10:11 5.3M [VID] 27 of 31 - IAM Policy LLM Hallucination – Bad Summary of Documentation .webm 2025-09-18 10:11 2.6M [VID] 28 of 31 - IAM Policy LLM Hallucination – Following Up on Responses .webm 2025-09-18 10:11 8.9M [VID] 29 of 31 - IAM Broken Access Control Summary .webm 2025-09-18 10:11 17M [VID] 30 of 31 - Broken Access Control and Policy Analysis .webm 2025-09-18 10:11 202M [VID] 31 of 31 - Lab 1.3 Summary Broken Access Control and Analysis .webm 2025-09-18 10:11 6.1M

Recent Courses