Skip to content

Instantly share code, notes, and snippets.

View RajChowdhury240's full-sized avatar
💻
just another learner

Raj Chowdhury RajChowdhury240

💻
just another learner
  • Confidential
  • $ aws sts get-caller-identity
  • 18:56 (UTC +11:00)
View GitHub Profile
https://0day.gg/blog/claude-desktop-tcc-bypass/

Bypassing ec2:ImportImage Restrictions

Attack & Defense Guide

Understanding the Limitation

Service Control Policies (SCPs) are hard boundaries.

If an SCP explicitly denies ec2:ImportImage, the action cannot be performed by any principal — including root.

To restrict the ec2:ImportImage action in a corporate network using an IAM policy. This is an AWS security question about preventing users from importing custom images (which could contain malware, backdoors, or unauthorized software) into the corporate AWS environment.

  1. Deny the action - Use Deny effect to block ec2:ImportImage

  2. Conditions - Could add conditions like:

    • Source IP restrictions (corporate network CIDR)
    • VPC endpoint conditions
    • Tag-based restrictions
  • Resource-based restrictions
#!/usr/bin/env python3
"""
AWS Sandbox Account Role Scanner
Scans sandbox accounts for roles with 'sandbox-' prefix that don't have matching policies
"""
import boto3
import csv
import json
from concurrent.futures import ThreadPoolExecutor, as_completed

Google Site Kit WordPress Plugin - Step-by-Step Exploitation Guide

⚠️ LEGAL DISCLAIMER

This guide is for educational purposes and authorized security testing only. Do not attempt these exploits without explicit permission from system owners. Unauthorized access to computer systems is illegal and may result in criminal prosecution.


https://www.youtube.com/watch?v=CEvIs9y1uog
version: '3.8'
services:
database:
image: mysql:8.0
container_name: woo-lucky-wheel-db
restart: always
environment:
MYSQL_ROOT_PASSWORD: rootpassword123
MYSQL_DATABASE: wordpress
title = "SSTI RCE Final Findings"
url = "/ssti-findings"
layout = "default"
==
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>SSTI RCE Research - Final Findings</title>
<style>
title = "Final SSTI Exploit"
url = "/final-ssti"
layout = "default"
==
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>SSTI Safe Mode Bypass - FINAL</title>
<style>