Tech with Tyler
Ctrlk
LinkedInGitHubYouTube
  • 👋Welcome!
    • whoami
    • !!! Disclaimer !!!
  • 🎓Academy
    • AWS Security Cookbook by Tyler
    • My content on Cybr
    • My content on PwnedLabs
      • Cyber Range - Electra
      • Lab - Abusing Identity Providers in AWS
      • Lab - Prowler and AWS Security Hub
      • Blog - Abusing Identity Providers in AWS
      • Blog - Building Security Guardrails with AWS Resource Control Policies
      • Blog - Defending Against the whoAMI Attack with AWS Declarative Policies
    • My content on YouTube
  • 🤖AI
    • Running LLMs Locally
  • ☁️Cloud Security
    • AWS
    • Azure
    • Capture the Flags (CTFs)
    • Tools
  • Kubernetes & Containers
    • Kubernetes Threat Matrix
    • Kubernetes General Info
    • Docker
  • 👨‍💻Coding & CLI Tooling
    • CLI Tools
    • Coding and Scripting
    • Proxy Tooling
    • Touch ID for sudo
    • Terminal Customization
  • ⚙️DevSecOps
    • CI/CD
    • Hashicorp Terraform
    • Hashicorp Vault
    • IAC Scanning
    • Secrets Scanning
  • 🎁Miscellaneous
    • Jenkins
  • 💻Operating Systems
    • Linux
  • 🏗️Projects
    • Active Directory Homelab Automation
    • AWS Cloud Resume Challenge
    • Proxmox Homelab as Code
  • 📌Other
    • Useful Resources
Powered by GitBook
On this page

Was this helpful?

  1. 🎓Academy

My content on PwnedLabs

Hands-on Cloud Security labs I've built for PwnedLabs.io

Cyber Range - ElectraLab - Abusing Identity Providers in AWSLab - Prowler and AWS Security HubBlog - Abusing Identity Providers in AWSBlog - Building Security Guardrails with AWS Resource Control PoliciesBlog - Defending Against the whoAMI Attack with AWS Declarative Policies
PreviousLab - Encrypt and Decrypt Data with KMS and Data Encryption KeysNextCyber Range - Electra

Was this helpful?