PinnedPublished inInfoSec Write-upsSimple Recon MethodologyDifferent methodology to Recon targetsDec 3, 20201.1K5Dec 3, 20201.1K5
IDOR at Login function leads to leak user’s PII dataVulnerable Login function leads to leaking PII data for all registered users.Aug 30, 20221254Aug 30, 20221254Get an email whenever Eslam Akl publishes.SubscribeBy signing up, you will create a Medium account if you don’t already have one. Review our Privacy Policy for more information about our privacy practices.Medium sent you an email at to complete your subscription.
Published inInfoSec Write-upsAuthentication bypass using root arrayAuthentication bypass by using root array at the login process.Mar 22, 20224012Mar 22, 20224012
Published inInfoSec Write-upsCisco BroadWorks Vulnerabilities CVE-2021–34785 & CVE-2021–34786Cisco BroadWorks CVE-2021–34785 and CVE-2021–34786 details and POCOct 2, 2021653Oct 2, 2021653
Published inInfoSec Write-upsHow to write simple script to automate finding bugsSimple way to write python script to automate finding bugsSep 26, 20211711Sep 26, 20211711