Exploiting weak configurations in Google Cloud Identity Platform

This blog post talks all about understanding and exploiting weak configuration in GCP Identity Platform

To Read Complete Blog Click here 🙌

Pankaj Mouriya
Pankaj Mouriya
Security Analyst | AWS Certified Security - Specialty

I Workout, Diving Deep into K8s, AWS Security My Specialty, Find Bugs in Web Applications and drink lots of coffee.