el-hacker.org Downloads
    Name                                                                                                          Last modified      Size
 Name                                                                                                          Last modified      Size  
![[Volver]](/icons/back.gif) Parent Directory                                                                                                                   -
 Parent Directory                                                                                                                   -   
![[VID]](/icons/movie.gif) 1 of 31 - Course Roadmap .webm                                                                                2025-09-18 10:11  3.5M
 1 of 31 - Course Roadmap .webm                                                                                2025-09-18 10:11  3.5M  
![[VID]](/icons/movie.gif) 2 of 31 - Cloud Resource Hijacking .webm                                                                      2025-09-18 10:11  3.8M
 2 of 31 - Cloud Resource Hijacking .webm                                                                      2025-09-18 10:11  3.8M  
![[VID]](/icons/movie.gif) 3 of 31 - Cloud IAM Broken Access Control and Privilege Escalation .webm                                      2025-09-18 10:11  7.6M
 3 of 31 - Cloud IAM Broken Access Control and Privilege Escalation .webm                                      2025-09-18 10:11  7.6M  
![[VID]](/icons/movie.gif) 4 of 31 - Cloud IAM Broken Access Control Violations .webm                                                    2025-09-18 10:11  3.9M
 4 of 31 - Cloud IAM Broken Access Control Violations .webm                                                    2025-09-18 10:11  3.9M  
![[VID]](/icons/movie.gif) 5 of 31 - Cloud Managed Roles as Anti-Patterns .webm                                                          2025-09-18 10:11  2.5M
 5 of 31 - Cloud Managed Roles as Anti-Patterns .webm                                                          2025-09-18 10:11  2.5M  
![[VID]](/icons/movie.gif) 6 of 31 - AWS Managed Policy Resource Wildcard .webm                                                          2025-09-18 10:11   13M
 6 of 31 - AWS Managed Policy Resource Wildcard .webm                                                          2025-09-18 10:11   13M  
![[VID]](/icons/movie.gif) 7 of 31 - Azure Role Assignment Subscription Scope .webm                                                      2025-09-18 10:11  9.9M
 7 of 31 - Azure Role Assignment Subscription Scope .webm                                                      2025-09-18 10:11  9.9M  
![[VID]](/icons/movie.gif) 8 of 31 - Google Cloud Project Level Role Binding .webm                                                       2025-09-18 10:11  3.3M
 8 of 31 - Google Cloud Project Level Role Binding .webm                                                       2025-09-18 10:11  3.3M  
![[VID]](/icons/movie.gif) 9 of 31 - AWS Custom Policy Requirements .webm                                                                2025-09-18 10:11   14M
 9 of 31 - AWS Custom Policy Requirements .webm                                                                2025-09-18 10:11   14M  
![[VID]](/icons/movie.gif) 10 of 31 - AWS Horizonal Access Control Policy Restrictions .webm                                             2025-09-18 10:11  8.2M
 10 of 31 - AWS Horizonal Access Control Policy Restrictions .webm                                             2025-09-18 10:11  8.2M  
![[VID]](/icons/movie.gif) 11 of 31 - Azure and Google Cloud Broken Access Control Restrictions .webm                                    2025-09-18 10:11   16M
 11 of 31 - Azure and Google Cloud Broken Access Control Restrictions .webm                                    2025-09-18 10:11   16M  
![[VID]](/icons/movie.gif) 12 of 31 - Finding IAM Policies with Broken Access Control .webm                                              2025-09-18 10:11   26M
 12 of 31 - Finding IAM Policies with Broken Access Control .webm                                              2025-09-18 10:11   26M  
![[VID]](/icons/movie.gif) 13 of 31 - AWS IAM Access Analyzer Policy Analysis .webm                                                      2025-09-18 10:11   24M
 13 of 31 - AWS IAM Access Analyzer Policy Analysis .webm                                                      2025-09-18 10:11   24M  
![[VID]](/icons/movie.gif) 14 of 31 - AWS IAM Access Analyzer External Access .webm                                                      2025-09-18 10:11  5.2M
 14 of 31 - AWS IAM Access Analyzer External Access .webm                                                      2025-09-18 10:11  5.2M  
![[VID]](/icons/movie.gif) 15 of 31 - AWS IAM Access Analyzer Policy Generation .webm                                                    2025-09-18 10:11  9.2M
 15 of 31 - AWS IAM Access Analyzer Policy Generation .webm                                                    2025-09-18 10:11  9.2M  
![[VID]](/icons/movie.gif) 16 of 31 - Microsoft Entra ID Permissions Management .webm                                                    2025-09-18 10:11  3.2M
 16 of 31 - Microsoft Entra ID Permissions Management .webm                                                    2025-09-18 10:11  3.2M  
![[VID]](/icons/movie.gif) 17 of 31 - Google Cloud IAM Policy Intelligence .webm                                                         2025-09-18 10:11   11M
 17 of 31 - Google Cloud IAM Policy Intelligence .webm                                                         2025-09-18 10:11   11M  
![[VID]](/icons/movie.gif) 18 of 31 - Google Cloud Policy Analyzer Results .webm                                                         2025-09-18 10:11  3.6M
 18 of 31 - Google Cloud Policy Analyzer Results .webm                                                         2025-09-18 10:11  3.6M  
![[VID]](/icons/movie.gif) 19 of 31 - Google Cloud IAM Recommender .webm                                                                 2025-09-18 10:11  2.5M
 19 of 31 - Google Cloud IAM Recommender .webm                                                                 2025-09-18 10:11  2.5M  
![[VID]](/icons/movie.gif) 20 of 31 - Using Large Language Models for IAM Policy Analysis .webm                                          2025-09-18 10:11   18M
 20 of 31 - Using Large Language Models for IAM Policy Analysis .webm                                          2025-09-18 10:11   18M  
![[VID]](/icons/movie.gif) 21 of 31 - Relevant LLM Terminology .webm                                                                     2025-09-18 10:11   43M
 21 of 31 - Relevant LLM Terminology .webm                                                                     2025-09-18 10:11   43M  
![[VID]](/icons/movie.gif) 22 of 31 - Applying LLMs to Security – Ineffective Use Cases .webm                                          2025-09-18 10:11   68M
 22 of 31 - Applying LLMs to Security – Ineffective Use Cases .webm                                          2025-09-18 10:11   68M  
![[VID]](/icons/movie.gif) 23 of 31 - Applying LLMs to Security – Promising Use Cases .webm                                            2025-09-18 10:11   38M
 23 of 31 - Applying LLMs to Security – Promising Use Cases .webm                                            2025-09-18 10:11   38M  
![[VID]](/icons/movie.gif) 24 of 31 - Explaining IAM Policy with an LLM .webm                                                            2025-09-18 10:11  2.2M
 24 of 31 - Explaining IAM Policy with an LLM .webm                                                            2025-09-18 10:11  2.2M  
![[VID]](/icons/movie.gif) 25 of 31 - Creating IAM Policy with an LLM – No Context .webm                                               2025-09-18 10:11  4.3M
 25 of 31 - Creating IAM Policy with an LLM – No Context .webm                                               2025-09-18 10:11  4.3M  
![[VID]](/icons/movie.gif) 26 of 31 - Creating IAM Policy with an LLM – Some Context .webm                                             2025-09-18 10:11  5.3M
 26 of 31 - Creating IAM Policy with an LLM – Some Context .webm                                             2025-09-18 10:11  5.3M  
![[VID]](/icons/movie.gif) 27 of 31 - IAM Policy LLM Hallucination – Bad Summary of Documentation .webm                                2025-09-18 10:11  2.6M
 27 of 31 - IAM Policy LLM Hallucination – Bad Summary of Documentation .webm                                2025-09-18 10:11  2.6M  
![[VID]](/icons/movie.gif) 28 of 31 - IAM Policy LLM Hallucination – Following Up on Responses .webm                                   2025-09-18 10:11  8.9M
 28 of 31 - IAM Policy LLM Hallucination – Following Up on Responses .webm                                   2025-09-18 10:11  8.9M  
![[VID]](/icons/movie.gif) 29 of 31 - IAM Broken Access Control Summary .webm                                                            2025-09-18 10:11   17M
 29 of 31 - IAM Broken Access Control Summary .webm                                                            2025-09-18 10:11   17M  
![[VID]](/icons/movie.gif) 30 of 31 - Broken Access Control and Policy Analysis .webm                                                    2025-09-18 10:11  202M
 30 of 31 - Broken Access Control and Policy Analysis .webm                                                    2025-09-18 10:11  202M  
![[VID]](/icons/movie.gif) 31 of 31 - Lab 1.3 Summary Broken Access Control and Analysis .webm                                           2025-09-18 10:11  6.1M
 31 of 31 - Lab 1.3 Summary Broken Access Control and Analysis .webm                                           2025-09-18 10:11  6.1M