200+
Penetration Tests Completed
Security Researcher
Manoj Deshmukh
6+ years finding exploitable weaknesses and helping teams fix them in production
I deliver scoped security assessments from exploit discovery to verified remediation, with clear reporting for engineering and leadership teams.
I help organizations identify and close high-impact security gaps across applications, cloud platforms, and Kubernetes workloads.
200+
Penetration Tests Completed
75+
Cloud Security Engagements
40+
Container Security Reviews
Each engagement is outcome-driven: identify real risk, fix it fast, and validate closure.
Web, API, and infrastructure adversarial testing.
Cluster hardening, policy controls, and runtime defense.
Posture assessment, IAM security, and cloud architecture hardening.
Practical CI/CD security gates with developer-friendly workflows.
Image, runtime, and workload security controls.
Scope Security assessment of an enterprise Identity & Access Management (IAM) platform focusing on API authentication, authorization controls, and user management workflows.
Findings Unauthenticated administrative APIs, RBAC bypass, bulk user data exposure, and file download path traversal allowing sensitive system file access.
Execution Performed manual API security testing, request manipulation, and authorization bypass testing to demonstrate full administrative takeover.
Outcome Full administrative account creation achieved, user database exposure identified, and critical authorization flaws remediated.
Scope Multi-tenant Kubernetes environment used by customer-facing workloads.
Findings Overprivileged service accounts, permissive network policies, and weak workload security contexts.
Execution Built hardening baseline, enforced admission policies, and tuned runtime detections for noisy clusters.
Outcome 65% reduction in high-risk misconfigurations and risky deployments blocked at admission.
Scope AWS workloads using containers across EKS, CI/CD, and registry pipelines.
Findings Weak IAM trust policies, exposed secrets in pipelines, and unscanned base images in production builds.
Execution Prioritized exploitable attack paths, introduced preventive controls, and reran validation after fixes.
Outcome 48 exploitable cloud/container paths removed and guardrails added for ongoing prevention.
Please wait while we fetch recent blogs.
Preparing training and workshop highlights.
If you need a trusted partner to test, break, and secure cloud-native systems, let's discuss your environment.