<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="/rss/styles.xsl" type="text/xsl"?><rss version="2.0"><channel><title>thatpentesterguy&apos;s blog</title><description>Just random 3 AM thoughts</description><link>https://security-blog.example.com/</link><language>en-us</language><item><title>Abusing AWS Systems Manager as a Covert C2 Channel</title><link>https://security-blog.example.com/posts/abusing-aws-ssm-c2/</link><guid isPermaLink="true">https://security-blog.example.com/posts/abusing-aws-ssm-c2/</guid><description>How AWS SSM hybrid activations can be weaponized as a stealthy Living-off-the-Cloud C2 platform on non-EC2 machines — and how to detect it.</description><pubDate>Wed, 20 May 2026 00:00:00 GMT</pubDate><category>aws</category><category>ssm</category><category>c2</category><category>red-team</category><category>living-off-the-cloud</category><category>detection</category><category>Red Team Ops</category></item></channel></rss>