el-hacker.org Downloads
   
 Name                                                                                                          Last modified      Size  
 Parent Directory                                                                                                                   -   
 24 of 31 - Explaining IAM Policy with an LLM .webm                                                            2025-09-18 10:11  2.2M  
 5 of 31 - Cloud Managed Roles as Anti-Patterns .webm                                                          2025-09-18 10:11  2.5M  
 19 of 31 - Google Cloud IAM Recommender .webm                                                                 2025-09-18 10:11  2.5M  
 27 of 31 - IAM Policy LLM Hallucination – Bad Summary of Documentation .webm                                2025-09-18 10:11  2.6M  
 16 of 31 - Microsoft Entra ID Permissions Management .webm                                                    2025-09-18 10:11  3.2M  
 8 of 31 - Google Cloud Project Level Role Binding .webm                                                       2025-09-18 10:11  3.3M  
 1 of 31 - Course Roadmap .webm                                                                                2025-09-18 10:11  3.5M  
 18 of 31 - Google Cloud Policy Analyzer Results .webm                                                         2025-09-18 10:11  3.6M  
 2 of 31 - Cloud Resource Hijacking .webm                                                                      2025-09-18 10:11  3.8M  
 4 of 31 - Cloud IAM Broken Access Control Violations .webm                                                    2025-09-18 10:11  3.9M  
 25 of 31 - Creating IAM Policy with an LLM – No Context .webm                                               2025-09-18 10:11  4.3M  
 14 of 31 - AWS IAM Access Analyzer External Access .webm                                                      2025-09-18 10:11  5.2M  
 26 of 31 - Creating IAM Policy with an LLM – Some Context .webm                                             2025-09-18 10:11  5.3M  
 31 of 31 - Lab 1.3 Summary Broken Access Control and Analysis .webm                                           2025-09-18 10:11  6.1M  
 3 of 31 - Cloud IAM Broken Access Control and Privilege Escalation .webm                                      2025-09-18 10:11  7.6M  
 10 of 31 - AWS Horizonal Access Control Policy Restrictions .webm                                             2025-09-18 10:11  8.2M  
 28 of 31 - IAM Policy LLM Hallucination – Following Up on Responses .webm                                   2025-09-18 10:11  8.9M  
 15 of 31 - AWS IAM Access Analyzer Policy Generation .webm                                                    2025-09-18 10:11  9.2M  
 7 of 31 - Azure Role Assignment Subscription Scope .webm                                                      2025-09-18 10:11  9.9M  
 17 of 31 - Google Cloud IAM Policy Intelligence .webm                                                         2025-09-18 10:11   11M  
 6 of 31 - AWS Managed Policy Resource Wildcard .webm                                                          2025-09-18 10:11   13M  
 9 of 31 - AWS Custom Policy Requirements .webm                                                                2025-09-18 10:11   14M  
 11 of 31 - Azure and Google Cloud Broken Access Control Restrictions .webm                                    2025-09-18 10:11   16M  
 29 of 31 - IAM Broken Access Control Summary .webm                                                            2025-09-18 10:11   17M  
 20 of 31 - Using Large Language Models for IAM Policy Analysis .webm                                          2025-09-18 10:11   18M  
 13 of 31 - AWS IAM Access Analyzer Policy Analysis .webm                                                      2025-09-18 10:11   24M  
 12 of 31 - Finding IAM Policies with Broken Access Control .webm                                              2025-09-18 10:11   26M  
 23 of 31 - Applying LLMs to Security – Promising Use Cases .webm                                            2025-09-18 10:11   38M  
 21 of 31 - Relevant LLM Terminology .webm                                                                     2025-09-18 10:11   43M  
 22 of 31 - Applying LLMs to Security – Ineffective Use Cases .webm                                          2025-09-18 10:11   68M  
 30 of 31 - Broken Access Control and Policy Analysis .webm                                                    2025-09-18 10:11  202M