Posts

Exploiting weak configurations in Google Cloud Identity Platform
Exploiting weak configurations in Amazon Cognito
CSV Formula Injection
Authorization Checks Made Easy
The Blend of Developer Tools into Security Assessments
Finding Gems in JavaScript using Dumpster Diver
Linux Things - UBER-COOL things I Learned this Year(2k19)
Docker | Install | EC2 Ubuntu Docker Install