PinnedPublished inInfoSec Write-upsSimple Recon MethodologyDifferent methodology to Recon targetsDec 3, 20201K5Dec 3, 20201K5
IDOR at Login function leads to leak user’s PII dataVulnerable Login function leads to leaking PII data for all registered users.Aug 30, 20221224Aug 30, 20221224Get an email whenever Eslam Akl publishes.SubscribeBy signing up, you will create a Medium account if you don’t already have one. Review our Privacy Policy for more information about our privacy practices.Medium sent you an email at to complete your subscription.
Published inInfoSec Write-upsAuthentication bypass using root arrayAuthentication bypass by using root array at the login process.Mar 22, 20224002Mar 22, 20224002
Published inInfoSec Write-upsCisco BroadWorks Vulnerabilities CVE-2021–34785 & CVE-2021–34786Cisco BroadWorks CVE-2021–34785 and CVE-2021–34786 details and POCOct 2, 2021653Oct 2, 2021653
Published inInfoSec Write-upsHow to write simple script to automate finding bugsSimple way to write python script to automate finding bugsSep 26, 20211711Sep 26, 20211711