Exploiting weak configurations in Google Cloud Identity Platform

This blog post talks all about understanding and exploiting weak configuration in GCP Identity Platform

To Read Complete Blog Click here 🙌

Pankaj Mouriya
Pankaj Mouriya
Security Analyst

I Workout, Find Bugs in Web Applications and drink a lot of coffee.