
Argal Rawat Atul Singh Gautam โ๏ธ ๐
@kunwaratulhax0r
Followers
1K
Following
3K
Media
81
Statuses
4K
Leading Team Of AppSec Engineers | Not So Certified Hacker | Proud Rajput Boy ยฏ\(ใ)/ยฏ| Opinions are my OWN.|
Argal
Joined August 2015
RT @clintgibler: ๐ ๏ธ Two JAMF Security Tools.๐๐๐ฆ๐๐๐จ๐ฎ๐ง๐ - Ingest JAMF attack paths into BloodHound.๐๐ฏ๐ - A JAMF exploitation toolkit. 1๏ธโฃ Jamโฆ.
0
38
0
RT @clintgibler: โ๏ธ ๐๐๐ ๐ซ๐:๐๐ง๐๐จ๐ซ๐๐ 2025 ๐๐๐ฅ๐ค ๐๐ฎ๐ฆ๐ฆ๐๐ซ๐ข๐๐ฌ.Don't have time to watch 163 talks?.โก๏ธ Repo with summaries, transcripts, key points,โฆ.
0
11
0
RT @clintgibler: ๐๐ญ๐๐ซ๐ญ๐ข๐ง๐ ๐ ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ซ๐จ๐ ๐ซ๐๐ฆ ๐๐ซ๐จ๐ฆ ๐๐๐ซ๐๐ญ๐๐ก (๐จ๐ซ ๐ซ๐-๐ฌ๐ญ๐๐ซ๐ญ๐ข๐ง๐ ). A four phase, 16-step framework by former Google Cloud CISO / Gโฆ.
philvenables.com
Iโve had a number of requests to write a post about how to start and grow a new security program - or a substantial reassessment and rebuild of an existing program.ย This is a difficult one to write...
0
11
0
RT @clintgibler: โ๏ธ ๐ ๐๐ฅ๐จ๐ฎ๐ ๐๐ง๐๐ข๐๐๐ง๐ญ ๐๐๐๐๐ข๐ง๐๐ฌ๐ฌ: ๐๐๐ฒ ๐ฅ๐จ๐ ๐ฌ ๐๐จ๐ซ ๐๐ฅ๐จ๐ฎ๐ ๐ข๐ง๐๐ข๐๐๐ง๐ญ๐ฌ. The must-have, should-have, and nice-to-have cloud logs for iโฆ.
0
12
0
RT @bnchandrapal: My two cents if you're preparing for Senior Cloud Security Engineering Interviews.
0
1
0
RT @RandomDhiraj: I wrote a blog on "Hunting Common Misconfigurations in Electron Apps - Part 1" (@cobalt_io) .#infโฆ.
cobalt.io
Discover common misconfigurations in Electron apps that can lead to security vulnerabilities, and learn how to secure your applications effectively.
0
24
0
RT @tom_doerr: CISO Assistant: an open-source tool for managing Governance, Risk, and Compliance (GRC) across over 70 frameworks, includingโฆ.
0
359
0
RT @clintgibler: โ๏ธ Top AWS re:Invent Announcements for Security Teams 2024. Great overview by @0xdabbad00. Resource Control Policies (RCPsโฆ.
wiz.io
Our favorite AWS re:Invent announcements tailored for security teams, including Resource Control Policies, Declarative Policies, and VPC Block Public Access.
0
9
0
RT @clintgibler: โ๏ธ Understanding new AWS Security features. 1. Centralizing Root Access with AssumeRoot.2. Resource Control Policies. 1๏ธโฃโฆ.
medium.com
TL;DR: AWS has introduced a centralized root access management feature for AWS Organizations. This blog covers why this is important, howโฆ
0
12
0
RT @clintgibler: ๐ฉ๏ธ How Attackers Can Abuse IAM Roles Anywhere for Persistent AWS Access. @Flekyy90 describes how via creating a maliciousโฆ.
medium.com
When AWS introduced IAM Roles Anywhere in July 2022 (AWS Announcement), I made my first contribution to Stratus Red Team. I believed thisโฆ
0
12
0
RT @AnonKryptiQuz: Gained a reverse shell through a PNG file using I-Espresso and Xploitra. Curious to try it yourself? Check the links bโฆ.
0
204
0
RT @clintgibler: ๐บ SANS CloudSecNext Summit 2024. The 19 talk recordings are live!. By @SANSInstitute. https://t.coโฆ.
0
51
0
RT @clintgibler: ๐ค Automatically creating secure-by-default AWS Terraform modules with AI. โ Extract security requirements from tools likeโฆ.
0
18
0
RT @clintgibler: ๐ Awesome Threat Detection. A curated list of awesome threat detection and hunting resources. By @0x4d31 and contributorsโฆ.
0
68
0
RT @DoomerOutrun: ๐ AWS VPC Half-Blind SSRF Tip ๐. Stuck in an unknown VPC? ๐ค Use this trick to find your IP range !. During a recent engagโฆ.
0
11
0
RT @clintgibler: โ๏ธ Turning AWS Documentation into Gold: AI-Assisted Security Research. How to scrape and analyze AWSโ documentation for seโฆ.
0
13
0
RT @TowardsAws: We are giving away an AWS Solution Architect Associate (SAA-CO3) voucher to our FREE newsletter subscribers. โ
Subscribe toโฆ.
0
75
0
RT @clintgibler: ๐ Announcing the Security Exceptions program pack 1.0. @robertauger has released a set of resources for establishing a secโฆ.
0
7
0