1. Abusing Function Execution Flows
  2. Lambda Backdoor (Persistence Access)
  3. Stealing Credentials from Lambda
  4. Retrieving Invocation Event
  5. Denial of Wallet (DOW)
  6. Lambda Alias Routing
  7. Injecting Malicious Runtime
  8. Created By: @devansh3008