How to convert an unique identifier to a principal ARN.| hackingthe.cloud
Discover how to exploit cross-account behaviors to enumerate IAM users and roles in another AWS account without authentication.| hackingthe.cloud
Common misconfigurations of resource-based policies and how they can be abused.| hackingthe.cloud