Security Researcher

Manoj Deshmukh

Penetration Testing for Cloud, Container Environments, Web and APIs

6+ years finding exploitable weaknesses and helping teams fix them in production

I deliver scoped security assessments from exploit discovery to verified remediation, with clear reporting for engineering and leadership teams.

Manoj Deshmukh profile photo
manoj@security:~
manoj@security:~$

$ About Me

I help organizations identify and close high-impact security gaps across applications, cloud platforms, and Kubernetes workloads.

200+

Penetration Tests Completed

75+

Cloud Security Engagements

40+

Container Security Reviews

$ Services

Each engagement is outcome-driven: identify real risk, fix it fast, and validate closure.

Penetration Testing

Web, API, and infrastructure adversarial testing.

Kubernetes Security

Cluster hardening, policy controls, and runtime defense.

Cloud Security

Posture assessment, IAM security, and cloud architecture hardening.

DevSecOps Security

Practical CI/CD security gates with developer-friendly workflows.

Container Security

Image, runtime, and workload security controls.

$ Case Studies

Scope Security assessment of an enterprise Identity & Access Management (IAM) platform focusing on API authentication, authorization controls, and user management workflows.

Findings Unauthenticated administrative APIs, RBAC bypass, bulk user data exposure, and file download path traversal allowing sensitive system file access.

Execution Performed manual API security testing, request manipulation, and authorization bypass testing to demonstrate full administrative takeover.

Burp Suite OWASP ZAP Custom Python Scripts API Request Manipulation

Outcome Full administrative account creation achieved, user database exposure identified, and critical authorization flaws remediated.

Scope Multi-tenant Kubernetes environment used by customer-facing workloads.

Findings Overprivileged service accounts, permissive network policies, and weak workload security contexts.

Execution Built hardening baseline, enforced admission policies, and tuned runtime detections for noisy clusters.

Kyverno Falco Trivy kube-bench

Outcome 65% reduction in high-risk misconfigurations and risky deployments blocked at admission.

Scope AWS workloads using containers across EKS, CI/CD, and registry pipelines.

Findings Weak IAM trust policies, exposed secrets in pipelines, and unscanned base images in production builds.

Execution Prioritized exploitable attack paths, introduced preventive controls, and reran validation after fixes.

Pacu ScoutSuite Trivy Prowler

Outcome 48 exploitable cloud/container paths removed and guardrails added for ongoing prevention.

$ Blogs

Loading latest Medium posts...

Please wait while we fetch recent blogs.

Read More Blogs

$ Training & Workshops

Loading events...

Preparing training and workshop highlights.

$ Testimonials

$ Contact

If you need a trusted partner to test, break, and secure cloud-native systems, let's discuss your environment.