Pankaj Mouriya
Pankaj Mouriya
Home
Posts
Experience
Talks
Accomplishments
Content
Contact
Light
Dark
Automatic
Posts
KUBERNETES 101
Long-lived JWT - Abuse and Mitigation
Exploiting weak configurations in Google Cloud Identity Platform
Exploiting weak configurations in Amazon Cognito
CSV Formula Injection
Authorization Checks Made Easy
The Blend of Developer Tools into Security Assessments
Finding Gems in JavaScript using Dumpster Diver
Linux Things - UBER-COOL things I Learned this Year(2k19)
Docker | Install | EC2 Ubuntu Docker Install
Cite
×