PeachyCloudSecurity
Hands on lab for Cloud security | Container Security | DevSecOps | Kubernetes Security
Welcome to Peachy Cloud Security by the shukla duo (Anjali & Divyanshu), the place where we shall together unravel the secrets behind cloud security and container security via walkthroughs (occasionally).
Providing engaging videos and interactive sessions with hands on lab. Are your looking for the guidance on nailing an cloud security and container interview or switching from DevOps to cloud security?
️🌊 Linkedin: https://linktr.ee/peachycloudsecurity
🎥 YouTube: youtube.com/@peachycloudsecurity
📸 Instagram: instagram.com/peachycloudsecurity
👍 Topmate: topmate.io/peachycloudsecurity
⚠️ Disclaimer: The content and logo (created via chatgpt) represents the personal website i.e. an informal community focused on cloud security to keep things private. Any resemblance to any registered entity or copyrighted content is purely coincidental and unintentional.
Women in Cybersecurity: Journey of Breaking Stereotypes with Anjali
Black Hat Arsenal Demo: EKSi Lite – Simple Lightweight EKS Cluster Listing & Security Tool
CH-2 – GitHub Codespace Setup | AWS EKS Security Masterclass with OWASP EKS Goat
CH-1 – Intro & AWS IAM User Setup | AWS EKS Security Masterclass with OWASP EKS Goat
CH-0: Getting Started | AWS EKS Security Masterclass with OWASP EKS Goat
Kubernetes Security Hardening Lab: Kube-Bench vs Kube-Hunter
Hands on Lab: Scanning Docker Images & Kubernetes YAML with Trivy
Complete Cloud Security Engineer Roadmap for Beginners
AWS EKS Security Masterclass With OWASP EKS Goat | Pentesting EKS with OWASP EKS Goat
How Poisoned RAG System Impacts Real World AI - Demo Video
Part 2 | Top 10 AWS EKS Security Best Practices | Secure Your EKS Kubernetes Cluster Like a Pro
Part 1 | Elastic Kubernetes Service Architecture | Deep Dive into Internals for Top 10 EKS Security
Timed Tic Tac Toe: Building a Tic Tac Toe Upgrade with Amazon Q and AWS S3
Null Bangalore | Pentesters Approach to AWS IAM | Part-2: Exploiting IAM PassRole Misconfiguration.
Null Bangalore | Pentesters Approach to AWS IAM | Part-3: Exploiting IAM AssumeRole Misconfiguration
Null Bangalore | Pentesters Approach to AWS IAM | Part-1: IAM Policy to Managed S3 Bucket
AI-Powered IaC Security Scanner | Winner of BONUS Blog Post | The PartyRock Generative AI Hackathon
Serverless Siege: AWS Lambda Pentesting - OWASP Top 10 Serverless Demonstration at C0c0n 2023
Bypassing Google's Cloud Armour WAF with a Character Class Payload[a-z] | By Divyanshu