PinnedEslam AklinInfoSec Write-upsSimple Recon MethodologyDifferent methodology to Recon targets6 min read·Dec 3, 2020--5--5
Eslam AklIDOR at Login function leads to leak user’s PII dataVulnerable Login function leads to leaking PII data for all registered users.2 min read·Aug 30, 2022--4--4
Eslam AklinInfoSec Write-upsAuthentication bypass using root arrayAuthentication bypass by using root array at the login process.3 min read·Mar 22, 2022--2--2
Eslam AklinInfoSec Write-upsCisco BroadWorks Vulnerabilities CVE-2021–34785 & CVE-2021–34786Cisco BroadWorks CVE-2021–34785 and CVE-2021–34786 details and POC4 min read·Oct 2, 2021--3--3
Eslam AklinInfoSec Write-upsHow to write simple script to automate finding bugsSimple way to write python script to automate finding bugs5 min read·Sep 26, 2021--1--1