June 2025 - Perimeter Leak
In this walkthrough, we explore how to exploit a Spring Boot Java application and bypass an AWS Resource Control Policy.
Last updated 8 months ago