Cloud infrastructure and asset takeover techniques
Finding and exploiting exposed Google API keys
AWS S3 bucket reconnaissance and misconfiguration testing