Skip to content
View goodycy3's full-sized avatar
🏠
Working from home
🏠
Working from home
Block or Report

Block or report goodycy3

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
goodycy3/README.md

Hi 👋, I'm goody

Cloud Security Content Engineer @ Pwnlabs

goodycy3

Working

goodycyb

  • 🌱 I’m currently learning Cloud Threat Detection on AWS & GCP || Automation with Python scripting and Terraform

  • 👯 I’m looking to collaborate on Cloud Threat Detection Projects on any CSPs

  • 👨‍💻 All of my projects are available at https://hashnode.com/@goodycyb

  • 📝 I regularly write articles on https://medium.com/@goodycyb

  • 💬 Ask me anything about Cloud Security || Cybersecurity

  • 📫 How to reach me @ [email protected]

Blogs posts

Connect with me:

goodycyb https://www.linkedin.com/in/adediran-goodness/ @goodycyb @goodycyb goodycyb https://goodycyb.hashnode.dev/

Languages and Tools:

aws azure bash docker gcp git jenkins kubernetes python

 goodycy3

goodycy3

Pinned

  1. AWS-Cloud-Detection-Lab--W-Stratus-Red-Team-Tool-by-Datadog AWS-Cloud-Detection-Lab--W-Stratus-Red-Team-Tool-by-Datadog Public

    This lab demonstrates how the Stratus Red Team Tool by DataDog is used to simulate real-world attacks on an AWS environment and how Amazon Athena’s SQL is utilized to analyze CloudTrail logs for si…

  2. Cloud-Pentesting-AWS-IAM-Policies-Privilege-Escalation-w-Pacu Cloud-Pentesting-AWS-IAM-Policies-Privilege-Escalation-w-Pacu Public

    At the end of this Guided hands-on blog, you should be able to Install pacu and examine IAM policies via AWS CLI, identify users with excessive permissions, and understand how threat actors can lev…

    HCL

  3. Threat-Detection-in-Amazon-CloudTrail-Logs Threat-Detection-in-Amazon-CloudTrail-Logs Public

    This project aims to guide you in enhancing threat detection within your AWS environment by exploring the anatomy of CloudTrail Events. It demonstrate how to leverage Amazon Athena service for iden…

    1

  4. SANS-AWS-Detection SANS-AWS-Detection Public

    This lab write-up credits SANS for the Workshop on Building Detections in AWS. It replicates the workshop guide by the Cloud Security SANS Team

  5. Vulnerable-Cloud-File-Storage-on-AWS-S3 Vulnerable-Cloud-File-Storage-on-AWS-S3 Public

    This project showcases vulnerable cloud file storage on AWS S3, aiming to help developers and cloud security engineers understand security flaws when building web apps allowing file uploads to Amaz…

    PowerShell

  6. Flaws.Cloud Flaws.Cloud Public

    Welcome to the "Flaws in Cloud Challenge" walkthrough, where we will explore common mistakes and pitfalls when utilizing Amazon Web Services (AWS).