Skip to content

Instantly share code, notes, and snippets.

View RajChowdhury240's full-sized avatar
💻
just another learner

Raj Chowdhury RajChowdhury240

💻
just another learner
  • Confidential
  • $ aws sts get-caller-identity
  • 11:02 (UTC +10:00)
View GitHub Profile
https://fzl-aws.notion.site/PatriotCTF-2023-4aff0a446b6e4cce9318fc79c52e0397
#!/usr/bin/env python3
"""
AWS Permission Boundary Scanner
Scans all active AWS accounts to find roles with 'syf-Sandbox-permission-boundary' attached.
Uses multithreading for optimal performance across 217+ accounts.
"""
import boto3
import csv
import json

j

import os
import boto3
AWS_ACCESS_KEY_ID = os.environ['AWS_ACCESS_KEY_ID']
AWS_SECRET_ACCESS_KEY = os.environ['AWS_SECRET_ACCESS_KEY']
iam_client = boto3.client(
'iam',
aws_access_key_id=AWS_ACCESS_KEY_ID,
aws_secret_access_key=AWS_SECRET_ACCESS_KEY,
endpoint_url=http://cloud.htb,
#!/usr/bin/env python3
import boto3
import json
from botocore.exceptions import ClientError, NoCredentialsError
import base64
def enumerate_lambda_functions():
AWS_ACCESS_KEY_ID = "ASIACVH82GQZDCNK2X9B"
AWS_SECRET_ACCESS_KEY = "cnVpO1/EjpR7pger+ELweFdbzKcyDe+5F3tbGOdn"
index=* sourcetype=*
| rex field=_raw "(?<aws_access_key_id>(AKIA|ASIA)[0-9A-Z]{16})"
| rex field=_raw "(?<aws_secret_access_key>[A-Za-z0-9/+=]{40})"
| rex field=_raw "(?<aws_session_token>(?i)aws_session_token[\"'=:\s]+[A-Za-z0-9/+=]{80,})"
| where isnotnull(aws_access_key_id) OR isnotnull(aws_secret_access_key) OR isnotnull(aws_session_token)
| table _time host source aws_access_key_id aws_secret_access_key aws_session_token
index=aws
| regex _raw="(AKIA[0-9A-Z]{16}|ASIA[0-9A-Z]{16})"
local wezterm = require("wezterm")
local mappings = require("modules.mappings")
-- Show which key table is active in the status area
wezterm.on("update-right-status", function(window, pane)
local name = window:active_key_table()
if name then
name = "TABLE: " .. name
end
window:set_right_status(name or "")
https://fzl-aws.notion.site/Analysing-ChatGPT-Tokens-f736a6ca210149079b5e161fa68a3ef0?pvs=73
https://fzl-aws.notion.site/Hacking-ChatGPT-Prompt-Injection-Techniques-more-770f107dc7e34a669e69d55789ae9edb