👋Welcome!
⚠️ Caution: This blog is mine alone. Everything posted here reflects my personal views only. Nothing I say represents my employer or any other organization I’m affiliated with. Don’t confuse the two.
WhoAmI?
Penetration Tester, Bug Hunter, Traveller, Gamer, and CAT Lover. I love Cats more than anything else 😄

Short Definition 😄
Penetration tester with +5 years of experience in various domains such as Web, API, Mobile (Android & iOS), Cloud Applications Penetration Testing, Manual/automated security-focused code review and Network Penetration Testing.
Author of 15 CVEs (0day vulnerabilities) at Cisco, OpenCode Systems, ASUS, and MISYS for Telecom and Banking applications. (CVE-2021-34785 - Cisco || CVE-2021-34786 - Cisco and +13 more). Some of them are published in the left drop-down list :)
Collaborated with technical teams by delivering actionable, risk-based insights derived from penetration testing activities.
Bug Bounty Hunter, acknowledged by Google, Cisco, MasterCard, Uber, RedHat, IBM, Spotify, FIS, IKEA, and more.
I love write code, then break it :) I'm the author of SQLiDetector, GG-Dorking, ShoLister, 3klCon, MeowEye and more.
Former Speaker @BSidesCAIRO 2022.
Blog's Content
Here you can find topics related to
Bug Hunting and Penetration Testing Findings (Allowed to be published)
Contact Me!
If you want to contact me, please don't hesitate to ping me via LinkedIn (temp closed), or eslamakl198@gmail.com. I can detect the phishing emails, good luck :) Also, you can take a look at my open-source tools and scripts via my GitHub profile 🎉
Have a nice CAT <3

Last updated