# GCP - Workflows Post Exploitation {{#include ../../../banners/hacktricks-training.md}} ## Workflow Basic information: {{#ref}} ../gcp-services/gcp-workflows-enum.md {{#endref}} ### Post Exploitation The post exploitation techniques are actually the same ones as the ones shared in the Workflows Privesc section: {{#ref}} ../gcp-privilege-escalation/gcp-workflows-privesc.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}}