HackTricks Cloud

Tip

学习和实践 AWS 黑客技术:HackTricks Training AWS Red Team Expert (ARTE)
学习和实践 GCP 黑客技术:HackTricks Training GCP Red Team Expert (GRTE) 学习和实践 Azure 黑客技术:HackTricks Training Azure Red Team Expert (AzRTE)

支持 HackTricks

HackTricks 标志与动效由 @ppieranacho.

在本地运行 HackTricks Cloud

# Download latest version of hacktricks cloud
git clone https://github.com/HackTricks-wiki/hacktricks-cloud

# Select the language you want to use
export LANG="master" # Leave master for English
# "af" for Afrikaans
# "de" for German
# "el" for Greek
# "es" for Spanish
# "fr" for French
# "hi" for Hindi
# "it" for Italian
# "ja" for Japanese
# "ko" for Korean
# "pl" for Polish
# "pt" for Portuguese
# "sr" for Serbian
# "sw" for Swahili
# "tr" for Turkish
# "uk" for Ukrainian
# "zh" for Chinese

# Run the docker container indicating the path to the hacktricks-cloud folder
docker run -d --rm --platform linux/amd64 -p 3377:3000 --name hacktricks_cloud -v $(pwd)/hacktricks-cloud:/app ghcr.io/hacktricks-wiki/hacktricks-cloud/translator-image bash -c "mkdir -p ~/.ssh && ssh-keyscan -H github.com >> ~/.ssh/known_hosts && cd /app && git checkout $LANG && git pull && MDBOOK_PREPROCESSOR__HACKTRICKS__ENV=dev mdbook serve --hostname 0.0.0.0"

您的本地 HackTricks Cloud 副本将在一分钟后 可通过 http://localhost:3377 访问

Pentesting CI/CD 方法论

在 HackTricks CI/CD Methodology 中,你将找到如何对与 CI/CD 活动相关的基础设施进行 pentest。 阅读下列页面以获取介绍:

pentesting-ci-cd-methodology.md

Pentesting Cloud 方法论

在 HackTricks Cloud Methodology 中,你将找到如何对云环境进行 pentest。 阅读下列页面以获取介绍:

pentesting-cloud-methodology.md

许可与免责声明

请在以下处查看:

HackTricks Values & FAQ

Github 统计

HackTricks Cloud Github Stats

Tip

学习和实践 AWS 黑客技术:HackTricks Training AWS Red Team Expert (ARTE)
学习和实践 GCP 黑客技术:HackTricks Training GCP Red Team Expert (GRTE) 学习和实践 Azure 黑客技术:HackTricks Training Azure Red Team Expert (AzRTE)

支持 HackTricks