forked from nccgroup/PMapper
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Updated the home page and fixed CSS issue
- Loading branch information
1 parent
728895f
commit 8a7e94e
Showing
3 changed files
with
27 additions
and
11 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,11 @@ | ||
# hackingthe.cloud ![Deploy](https://github.com/Hacking-the-Cloud/hackingthe.cloud/workflows/Deploy/badge.svg) | ||
Hacking the cloud is an open source encyclopedia of attacks against cloud infrastructure. | ||
Hacking the cloud is a encyclopedia of the attacks/tactics/techniques that offensive security professionals can use on their next cloud exploitation adventure. The goal is to share this knowledge with the security community to better defend cloud native technologies. | ||
|
||
## Contributing | ||
Anyone is welcome to submit a pull request with whatever topic you'd like to write about. Content will be reviewed for quality and accuracy. Please keep topics related to cloud relevant material (AWS, Azure, GCP, Docker, K8s, Terraform, etc.). You are also welcome to expand upon existing topics, make improvements, and add details. | ||
All content on this site is created by volunteers. If you'd like to be one of them, you can contribute your knowledge by submitting a [Pull Request](https://github.com/Hacking-the-Cloud/hackingthe.cloud/pulls). We are open to content from any major cloud provider and will also accept cloud-related technologies as well (Docker, Terraform, K8s, etc.). Additionally you are encouraged to update/modify/improve existing pages as well. | ||
|
||
Topics can include offensive techniques, tools, general knowledge related to cloud security, etc. **Defensive knowledge is also welcome!** At the end of the day the primary goal is to make the cloud safer, and defenders are welcome to submit content all the same. | ||
|
||
Don't worry about submitting content in the wrong format or what section it should be a part of, we can always make improvements later :) | ||
|
||
## Roadmap | ||
Currently the site has some material on AWS, and very little for Azure or GCP. If you have experience in any of those areas you are welcome to submit content. Even something as small as fixing grammar mistakes or adding a screenshot is appreciated! In the future I'd like to expand the site to include labs for folks to get hands-on experience with the content. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters