Skip to content
Avatar
🖋️
"Pen" Testing
🖋️
"Pen" Testing
Block or Report

Block or report Frichetten

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Frichetten/README.md

"Hello there"

My name is Nick Frichette and I'm a Senior Security Researcher, primarily focussed on cloud, web application, and CI/CD exploitation. Previously, I worked as a Penetration Tester and Team Lead for a large financial services company. In addition, I'm the creator and primary maintainer of Hacking the Cloud, an encyclopedia of the techniques that offensive security professionals can use against cloud environments.

Aside from that, I'm fortunate to be a part of the AWS Community Builders Program and I also support the Tor project through my Tor nodes.

This GitHub profile contains a bunch of stuff, and some of it is "good". You can find most of my research at my blog.

Vulnerability Research

In my off time I do security research, primarily focused on AWS.

Community Involvement

I'm involved/participate with the security community in several ways. Here are just a few.

  • Screaming in the Cloud #226 - Corey Quinn - I was a guest on the Screaming in the Cloud podcast, hosted by Corey Quinn. We talked about offensive security in AWS, AWS security research, and more.
  • Research in the News - My research has been featured in multiple well-known newsletters including CloudSecList, tl;dr sec, and Bug Bytes.
  • ShellCon 2020 - Gave a talk (Hacking AWS - TTPs for the Cloud) at the Main Track of ShellCon 2020. Covered the tactics and techniques a penetration testing or red team can leverage when attacking AWS infrastructure.

Certifications

OSCP OSWE
GXPN GPEN
AWS Certified Security Specialist HashiCorp Terraform Certified Associate

Pinned

  1. An encyclopedia for offensive and defensive security knowledge in cloud native technologies.

    HTML 730 106

  2. PoC for CVE-2019-5736

    Go 594 159

  3. PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole

    Python 24 8

  4. Research on the enumeration of IAM permissions without logging to CloudTrail

    Python 47 7

  5. Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints

    HCL 49 8

  6. This is a custom SSM agent which is sorta functional

    Python 10 4

496 contributions in the last year

Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Mon Wed Fri

Contribution activity

Seeing something unexpected? Take a look at the GitHub profile guide.