PinnedFound SSRF and LFI in Just 10 minutes of using burp!Hello, and welcome again after about two years from the last published write-up. Here is a new write-up about a simple vulnerability I have…Mar 30, 20233Mar 30, 20233
From CRLF Injection to XSS: Elevating the Stakes in Apple iTunes Securityبسم الله الرحمن الرحيم Approximately eighteen months ago, I discovered a significant vulnerability within Apple iTunesFeb 234Feb 234
The effectiveness of employing BChecks to uncover significant secretsUtilizing the BChecks methodology to systematically identify and expose highly sensitive information that could potentially compromiseFeb 15Feb 15
Uncovering SSRF Vulnerabilities Made Simple: Leveraging the Wayback Machine’s Saved PagesHi, I’m Khaled Mohamed — xElkomy. Excited to share my latest bug bounty finding! Stay tuned for the details! #BugBounty #Cybersecurity 🐛🔍Jul 19, 20231Jul 19, 20231
ازاي تعمل ريبورت لثغرة؟شرح عن ماهي البلاغ الخاص بالثغرات علي منصات اكتشاف الثغراتApr 23, 2023Apr 23, 2023
مراجعة شهادة — eWPTالمراجعة الخاصة بشهادة eWPT من Elearnsecurity الخاصة بمختبرين اختراق تطبيقات الويب او المواقعAug 23, 2021Aug 23, 2021
How to start in Bug bounty hunting?There in the world, some of the companies Create things called bug bounty programs why their do that? I will tell you there are many…Mar 25, 2021Mar 25, 2021
eJPT Review — مراجعة شهادة eJPTالسلام عليكم في البداية سوف نتكلم عن شهادة شركة elearnsecurityFeb 20, 2021Feb 20, 2021