🔐
EAkl Blog
  • 👋Welcome!
  • 🐛Web Application Findings
    • Cisco BroadWorks Vulnerabilities CVE-2021–34785 & CVE-2021–34786
    • Authentication bypass using empty parameters.
    • IDOR at Login function leads to leak user’s PII data
  • ℹ️Recon automation, tips and tricks
    • Simple Recon Methodology
    • How to write a simple script to automate finding bugs
  • 🔐Hack The Box Machines
    • Feline Walkthrough
    • Reel2 Walkthrough
    • Active Walkthrough
    • PopCorn Walkthrough
    • Jewel Walkthrough
    • Passage Walkthrough
    • Time Walkthrough
    • Devel Walkthrough
    • Lame Walkthrough
    • Beep Walkthrough
    • Blue Walkthrough
    • Jerry Walkthrough
    • Optimum Walkthrough
    • Grandpa Walkthrough
    • Legacy Walkthrough
    • Mirai Walkthrough
    • Valentine Walkthrough
    • Shocker Walkthrough
    • Netmon Walkthrough
    • Bank Walkthrough
    • Granny Walkthrough
    • Tabby Walkthrough
    • Access Walkthrough
    • Swagshop Walkthrough
    • OpenAdmin Walkthrough
    • Remote Walkthrough
    • Sauna Walkthrough
    • FriendZone Walkthrough
    • Hack The Box — Networked
    • Hack The Box — Forest
    • Hack The Box — WriteUP
    • Hack The Box — Academy
    • Hack The Box — Luanne
  • 🏴‍☠️CTF Challenges
    • CTF CyberTalents  — Bypass the world Writeup
    • CTF CyberTalents — Admin Gate First
    • CTF CyberTalents — Inbox
    • CTFlearn — Inj3ction Time
    • CTF ringzer0ctf — Challenge Access List
    • CTF ringzer0ctf — Login portal 2
    • CTF ringzer0ctf — SQLi challenges — part 1
    • CTF ringZer0ctf — Login form
  • 🔴Red Teaming Tips & Tricks
    • MOTW Defensive and Bypass techniques
  • ☁️Cloud Security
    • [Azure] Real Example to know different types of app concepts in Azure
    • [Azure] What To Do If?
Powered by GitBook
On this page
  • WhoAmI?
  • Short Definition 😄​
  • Blog's Content
  • Contact Me!

Welcome!

⚠️ Caution: This blog is mine alone. Everything posted here reflects my personal views only. Nothing I say represents my employer or any other organization I’m affiliated with. Don’t confuse the two.

NextWeb Application Findings

Last updated 27 days ago

WhoAmI?

Penetration Tester, Bug Hunter, Traveller, Gamer, and CAT Lover. I love Cats more than anything else

Short Definition 😄​

  • Penetration tester with +4 years of experience in various domains

    • Web Application Penetration Testing.

    • Mobile (Android & iOS) Application Penetration Testing.

    • API Penetration Testing.

    • Cloud Security (Azure) and learning more about AWS and GCP.

    • Network Penetration Testing.

    • Manual and automated security-focused code review.

  • Author of 10 CVEs (0day vulnerabilities) at Cisco, ASUS, and MISYS for Telecom and Banking applications. (CVE-2021-34785 - Cisco | CVE-2021-34786 - Cisco and +8 more)

  • Have a good experience in information security project management including penetration testing and following up with the IT development teams for remediation-related matters through risk rating.

  • Bug Bounty Hunter, acknowledged by Google, Cisco, MasterCard, Uber, RedHat, IBM, Spotify, FIS, IKEA, and more.

  • Team player but if it’s required, I can work independently with the same flexibility.

  • Helpful and Learner! Enthusiastic about learning, updating my knowledge every day, and sharing it with the community through my YouTube channel or GitHub for open-source tools.

  • Former Speaker @BSidesCAIRO 2022

Blog's Content

Here you can find topics related to

Contact Me!

​​Have a NICE time (CAT Kiss) <3

Security tool developer, author of , , , and .

Certifications: | | | |

(Allowed to be published)

If you want to contact me, please don't hesitate to ping via . Also, you can take a look at my open-source tools and scripts via my profile 🎉

👋
SQLiDetector
GG-Dorking
ShoLister
3klCon
more
OSCP+
CARTP
CRTO
eWAPTXv2
eMAPT
Bug Hunting and Penetration Testing Findings
Recon automation, tips, and tricks
Hack The Box Machines
CTF challenges.
Red Teaming tips and tricks.
Cloud Security
LinkedIn
GitHub
😄