Hi
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env python3 | |
| """ | |
| generate_readme_v2.py — Professional AWS Accounts Directory Generator (v2) | |
| Generates a rich, visually polished README.md with: | |
| - HTML tables with color-coded rows (prod/sandbox/dev) | |
| - Clickable switch-role buttons styled as badges | |
| - Summary statistics dashboard | |
| - Collapsible OU tree | |
| - Versatile (external org) accounts section |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env python3 | |
| """ | |
| Generate README.md with all active AWS accounts info. | |
| Pulls account details from AWS Organizations and tags, | |
| then renders a Bitbucket-compatible Markdown table. | |
| """ | |
| import boto3 | |
| from datetime import datetime, timezone |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| title = "Demonstration" | |
| url = "/" | |
| layout = "default" | |
| == | |
| function onStart() | |
| { | |
| // SSTI Proof of Concept - Command Execution | |
| $this['var'] = 'Winter CMS'; | |
| // RCE: Execute system command through PHP code section |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| https://0day.gg/blog/claude-desktop-tcc-bypass/ |
To restrict the ec2:ImportImage action in a corporate network using an IAM policy. This is an AWS security question about preventing users from importing custom images (which could contain malware, backdoors, or unauthorized software) into the corporate AWS environment.
-
Deny the action - Use Deny effect to block ec2:ImportImage
-
Conditions - Could add conditions like:
- Source IP restrictions (corporate network CIDR)
- VPC endpoint conditions
- Tag-based restrictions
- Resource-based restrictions
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env python3 | |
| """ | |
| AWS Sandbox Account Role Scanner | |
| Scans sandbox accounts for roles with 'sandbox-' prefix that don't have matching policies | |
| """ | |
| import boto3 | |
| import csv | |
| import json | |
| from concurrent.futures import ThreadPoolExecutor, as_completed |
This guide is for educational purposes and authorized security testing only. Do not attempt these exploits without explicit permission from system owners. Unauthorized access to computer systems is illegal and may result in criminal prosecution.
NewerOlder

