{{#include ../../../banners/hacktricks-training.md}}
Basic information:
{{#ref}} ../gcp-services/gcp-workflows-enum.md {{#endref}}
The post exploitation techniques are actually the same ones as the ones shared in the Workflows Privesc section:
{{#ref}} ../gcp-privilege-escalation/gcp-workflows-privesc.md {{#endref}}
{{#include ../../../banners/hacktricks-training.md}}