Write-up: Exploiting EC2 User Data and IMDS to escalate privileges
Write-up: Exploiting SNS subscriptions to leak API keys
Write-up: From low-privilege user to admin (Pacu approach)