Tech with Tyler
Ctrlk
LinkedInGitHubYouTube
  • πŸ‘‹Welcome!
    • whoami
    • !!! Disclaimer !!!
  • πŸŽ“Academy
    • AWS Security Cookbook by Tyler
    • My content on Cybr
    • My content on PwnedLabs
      • Cyber Range - Electra
      • Lab - Abusing Identity Providers in AWS
      • Lab - Prowler and AWS Security Hub
      • Blog - Abusing Identity Providers in AWS
      • Blog - Building Security Guardrails with AWS Resource Control Policies
      • Blog - Defending Against the whoAMI Attack with AWS Declarative Policies
    • My content on YouTube
  • πŸ€–AI
    • Running LLMs Locally
  • ☁️Cloud Security
    • AWS
    • Azure
    • Capture the Flags (CTFs)
    • Tools
  • Kubernetes & Containers
    • Kubernetes Threat Matrix
    • Kubernetes General Info
    • Docker
  • πŸ‘¨β€πŸ’»Coding & CLI Tooling
    • CLI Tools
    • Coding and Scripting
    • Proxy Tooling
  • βš™οΈDevSecOps
    • CI/CD
    • Hashicorp Terraform
    • Hashicorp Vault
    • IAC Scanning
    • Secrets Scanning
  • πŸ’»Operating Systems
    • Linux
    • macOS
  • 🎁Miscellaneous
    • Jenkins
  • πŸ—οΈProjects
    • Active Directory Homelab Automation
    • AWS Cloud Resume Challenge
    • Proxmox Homelab as Code
  • πŸ“ŒOther
    • Useful Resources
Powered by GitBook
On this page
  1. πŸŽ“Academy

My content on PwnedLabs

Hands-on Cloud Security labs I've built for PwnedLabs.io

Cyber Range - ElectraLab - Abusing Identity Providers in AWSLab - Prowler and AWS Security HubBlog - Abusing Identity Providers in AWSBlog - Building Security Guardrails with AWS Resource Control PoliciesBlog - Defending Against the whoAMI Attack with AWS Declarative Policies
PreviousLab - Encrypt and Decrypt Data with KMS and Data Encryption KeysNextCyber Range - Electra

Was this helpful?

Was this helpful?