Skip to content

Commit

Permalink
Merge pull request #370 from Hacking-the-Cloud/update/new_banner_image
Browse files Browse the repository at this point in the history
Updated banner image
  • Loading branch information
Frichetten authored Feb 1, 2024
2 parents b736e71 + 0c6834f commit 155d535
Show file tree
Hide file tree
Showing 4 changed files with 3 additions and 3 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
<p align="center">
<img src="content/images/branding/hacking-the-cloud-wordmark.png" />
<img src="content/images/branding/hacking-the-cloud-wordmark.jpg" />
</p>

![Deploy](https://github.com/Hacking-the-Cloud/hackingthe.cloud/workflows/deploy%20v2/badge.svg)
Expand Down
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file not shown.
4 changes: 2 additions & 2 deletions content/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ hide:
# Home

<figure markdown>
![Hacking the Cloud logo](/images/branding/hacking-the-cloud-wordmark.png)
![Hacking the Cloud logo](/images/branding/hacking-the-cloud-wordmark.jpg)
</figure>

Hacking the cloud is an encyclopedia of the attacks/tactics/techniques that offensive security professionals can use on their next cloud exploitation adventure. The goal is to share this knowledge with the security community to better defend cloud native technologies.
Expand All @@ -25,4 +25,4 @@ If you'd like to contribute to the site, please see our [contributing page](http
Please checkout the [GitHub page](https://github.com/Hacking-the-Cloud/hackingthe.cloud) for more!

## Disclaimer
The information provided by Hacking the Cloud is intended to be used by professionals who are authorized to perform security assessments or by those defending cloud environments. While these techniques can be used to avoid detection, escalate privileges, compromise resources, etc. the intent is to improve security by making the knowledge of these techniques more generally available.
The information provided by Hacking the Cloud is intended to be used by professionals who are authorized to perform security assessments or by those defending cloud environments. While these techniques can be used to avoid detection, escalate privileges, compromise resources, etc. the intent is to improve security by making the knowledge of these techniques more generally available.

0 comments on commit 155d535

Please sign in to comment.