PinnedEslam AklinInfoSec Write-upsSimple Recon MethodologyDifferent methodology to Recon targetsDec 3, 20205Dec 3, 20205
Eslam AklIDOR at Login function leads to leak user’s PII dataVulnerable Login function leads to leaking PII data for all registered users.Aug 30, 20224Aug 30, 20224Get an email whenever Eslam Akl publishes.SubscribeBy signing up, you will create a Medium account if you don’t already have one. Review our Privacy Policy for more information about our privacy practices.Medium sent you an email at to complete your subscription.
Eslam AklinInfoSec Write-upsAuthentication bypass using root arrayAuthentication bypass by using root array at the login process.Mar 22, 20222Mar 22, 20222
Eslam AklinInfoSec Write-upsCisco BroadWorks Vulnerabilities CVE-2021–34785 & CVE-2021–34786Cisco BroadWorks CVE-2021–34785 and CVE-2021–34786 details and POCOct 2, 20213Oct 2, 20213
Eslam AklinInfoSec Write-upsHow to write simple script to automate finding bugsSimple way to write python script to automate finding bugsSep 26, 20211Sep 26, 20211