PinnedFound SSRF and LFI in Just 10 minutes of using burp!Hello, and welcome again after about two years from the last published write-up. Here is a new write-up about a simple vulnerability I have…Mar 30, 2023A response icon3Mar 30, 2023A response icon3
PinnedHow I was able to get 1000$ bounty from a ds-store file?Let’s start?Aug 20, 2021A response icon5Aug 20, 2021A response icon5
Simple and Clear, Thanks Mr Fady, it's a great walkthrough.Feb 13A response icon1Feb 13A response icon1
From CRLF Injection to XSS: Elevating the Stakes in Apple iTunes Securityبسم الله الرحمن الرحيم Approximately eighteen months ago, I discovered a significant vulnerability within Apple iTunesFeb 23, 2024A response icon4Feb 23, 2024A response icon4
The effectiveness of employing BChecks to uncover significant secretsUtilizing the BChecks methodology to systematically identify and expose highly sensitive information that could potentially compromiseFeb 15, 2024Feb 15, 2024
Uncovering SSRF Vulnerabilities Made Simple: Leveraging the Wayback Machine’s Saved PagesHi, I’m Khaled Mohamed — xElkomy. Excited to share my latest bug bounty finding! Stay tuned for the details! #BugBounty #Cybersecurity 🐛🔍Jul 19, 2023A response icon1Jul 19, 2023A response icon1
ازاي تعمل ريبورت لثغرة؟شرح عن ماهي البلاغ الخاص بالثغرات علي منصات اكتشاف الثغراتApr 23, 2023Apr 23, 2023
مراجعة شهادة — eWPTالمراجعة الخاصة بشهادة eWPT من Elearnsecurity الخاصة بمختبرين اختراق تطبيقات الويب او المواقعAug 23, 2021Aug 23, 2021
How to start in Bug bounty hunting?There in the world, some of the companies Create things called bug bounty programs why their do that? I will tell you there are many…Mar 25, 2021Mar 25, 2021