Blog & Research

Attack techniques.
Misconfiguration patterns.

Technical writeups on cloud offensive security from the people who build the labs.

Misconfigurations

Top 10 Cloud Misconfigurations That Lead to Data Breaches

Most cloud breaches aren't zero-day exploits, they're misconfigurations. We break down the 10 most common cloud security mistakes with MITRE ATT&CK references and remediation guidance.

14 Apr 20266 min read
Research

EnvWatch: Find Exposed Cloud Secrets Before Hackers Do

A practical tool for scanning your local machine for exposed API keys, AWS credentials, private keys, and .env files, before an attacker does it for you.

22 Apr 202610 min read