🔐
EAkl Blog
  • 👋Welcome!
  • 🐛Web Application Findings
    • Cisco BroadWorks Vulnerabilities CVE-2021–34785 & CVE-2021–34786
    • Authentication bypass using empty parameters.
    • IDOR at Login function leads to leak user’s PII data
  • ℹ️Recon automation, tips and tricks
    • Simple Recon Methodology
    • How to write a simple script to automate finding bugs
  • 🔐Hack The Box Machines
    • Feline Walkthrough
    • Reel2 Walkthrough
    • Active Walkthrough
    • PopCorn Walkthrough
    • Jewel Walkthrough
    • Passage Walkthrough
    • Time Walkthrough
    • Devel Walkthrough
    • Lame Walkthrough
    • Beep Walkthrough
    • Blue Walkthrough
    • Jerry Walkthrough
    • Optimum Walkthrough
    • Grandpa Walkthrough
    • Legacy Walkthrough
    • Mirai Walkthrough
    • Valentine Walkthrough
    • Shocker Walkthrough
    • Netmon Walkthrough
    • Bank Walkthrough
    • Granny Walkthrough
    • Tabby Walkthrough
    • Access Walkthrough
    • Swagshop Walkthrough
    • OpenAdmin Walkthrough
    • Remote Walkthrough
    • Sauna Walkthrough
    • FriendZone Walkthrough
    • Hack The Box — Networked
    • Hack The Box — Forest
    • Hack The Box — WriteUP
    • Hack The Box — Academy
    • Hack The Box — Luanne
  • 🏴‍☠️CTF Challenges
    • CTF CyberTalents  — Bypass the world Writeup
    • CTF CyberTalents — Admin Gate First
    • CTF CyberTalents — Inbox
    • CTFlearn — Inj3ction Time
    • CTF ringzer0ctf — Challenge Access List
    • CTF ringzer0ctf — Login portal 2
    • CTF ringzer0ctf — SQLi challenges — part 1
    • CTF ringZer0ctf — Login form
  • 🔴Red Teaming Tips & Tricks
    • MOTW Defensive and Bypass techniques
  • ☁️Cloud Security
    • [Azure] Real Example to know different types of app concepts in Azure
    • [Azure] What To Do If?
Powered by GitBook
On this page
  • WhoAmI?
  • Short Definition 😄​
  • Blog's Content
  • Contact Me!

Welcome!

⚠️ Caution: This blog is mine alone. Everything posted here reflects my personal views only. Nothing I say represents my employer or any other organization I’m affiliated with. Don’t confuse the two.

NextWeb Application Findings

Last updated 1 month ago

WhoAmI?

Penetration Tester, Bug Hunter, Traveller, Gamer, and CAT Lover. I love Cats more than anything else

Short Definition 😄​

  • Penetration tester with +4 years of experience in various domains

    • Web Application Penetration Testing.

    • Mobile (Android & iOS) Application Penetration Testing.

    • API Penetration Testing.

    • Cloud Security (Azure) and learning more about AWS and GCP.

    • Network Penetration Testing.

    • Manual and automated security-focused code review.

  • Author of 10 CVEs (0day vulnerabilities) at Cisco, ASUS, and MISYS for Telecom and Banking applications. (CVE-2021-34785 - Cisco | CVE-2021-34786 - Cisco and +8 more)

  • Have a good experience in information security project management including penetration testing and following up with the IT development teams for remediation-related matters through risk rating.

  • Bug Bounty Hunter, acknowledged by Google, Cisco, MasterCard, Uber, RedHat, IBM, Spotify, FIS, IKEA, and more.

  • Team player but if it’s required, I can work independently with the same flexibility.

  • Helpful and Learner! Enthusiastic about learning, updating my knowledge every day, and sharing it with the community through my YouTube channel or GitHub for open-source tools.

  • Former Speaker @BSidesCAIRO 2022

Blog's Content

Here you can find topics related to

Contact Me!

​​Have a NICE time (CAT Kiss) <3

Security tool developer, author of , , , and .

Certifications: | | | |

(Allowed to be published)

If you want to contact me, please don't hesitate to ping via . Also, you can take a look at my open-source tools and scripts via my profile 🎉

👋
SQLiDetector
GG-Dorking
ShoLister
3klCon
more
OSCP+
CARTP
CRTO
eWAPTXv2
eMAPT
Bug Hunting and Penetration Testing Findings
Recon automation, tips, and tricks
Hack The Box Machines
CTF challenges.
Red Teaming tips and tricks.
Cloud Security
LinkedIn
GitHub
😄