Modam3r5's profile picture. a lot of dreams and less in reality

ahamed morad

@Modam3r5

a lot of dreams and less in reality

just awesome event thanks all #BHMEA23


ahamed morad reposted

حسبنا الله ونعم الوكيل عند الله تجتمع الخصوم 😢💔 #طرد_السفير_الاسراييلي_من_مصر


ahamed morad reposted

2 war criminals hugging 🇺🇸🇮🇱

DrLoupis's tweet image. 2 war criminals hugging 🇺🇸🇮🇱

ahamed morad reposted

🇮🇱🇵🇸 IDF-affiliated accounts are sharing this video serve as “proof” that Hamas bombed the Gaza Baptist Hospital. Only problem? This video is from August of 2022.

כך נראה שיגור כושל של הגי'אהד האיסלמי לתוך הרצועה



ahamed morad reposted

Bombing a hospital is a war crime, Israel is a terrorist


ahamed morad reposted

Have you ever used pastebin or codebeautify? So have developers at companies! @TakSec shows us some Google dorks that could uncover some of the data developers might have left behind on the internet! hubs.li/Q01B1Mnm0 #bugbounty #bugbountytips 👇

intigriti's tweet image. Have you ever used pastebin or codebeautify? So have developers at companies!

@TakSec shows us some Google dorks that could uncover some of the data developers might have left behind on the internet!
hubs.li/Q01B1Mnm0

#bugbounty #bugbountytips 👇

ahamed morad reposted

We found a Remote Code Execution vulnerability in every #PostgreSQL database in #IBMCloud 😱 Here is how we did it: 🧵 #HellsKeychain

nirohfeld's tweet image. We found a Remote Code Execution vulnerability in every #PostgreSQL database in #IBMCloud 😱

Here is how we did it: 🧵

#HellsKeychain

ahamed morad reposted

Reported a critical bug to @VelasBlockchain - the issue was promptly fixed, and no funds were lost 🥳 The technical writeup can be found here: 👇🏻 🧵 mirror.xyz/orenyomtov.eth…


ahamed morad reposted

Knowing your target is invaluable. This is some great research on interesting flaws in Salesforce-backed websites, by @Hypn@infosec.exchange hypn.za.net/blog/2022/11/1…


ahamed morad reposted

Nice little-known writeup on WhatsApp exploitation: awakened1712.github.io/hacking/hackin… < technically interesting for more than one reason


ahamed morad reposted

Yes, again a lot of AV is detect PingCastle Beta as malicious. Lets investigate and find the root cause. Thread 1/5

mysmartlogon's tweet image. Yes, again a lot of AV is detect PingCastle Beta as malicious. Lets investigate and find the root cause.
Thread
1/5

Finally macbook m1 pro has been arrived 🙏

Modam3r5's tweet image. Finally macbook m1 pro has been arrived 🙏
Modam3r5's tweet image. Finally macbook m1 pro has been arrived 🙏

One for all & all for one ♥️

I'm raising $10,000 for @LLSusa this time around. If you have ever wanted to support me or buy me a coffee/ramen/food, please donate it to this link instead. I'll also do whatever crazy thing the top donation says. pages.lls.org/ltn/sac/sacr21…



ahamed morad reposted

A patch is now available for CVE-2021-33193 - the Apache HTTP/2 request line injection vulnerability I disclosed last month! It also fixes an interesting looking SSRF... httpd.apache.org/security/vulne… portswigger.net/research/http2…


ahamed morad reposted

Created a tool for finding hidden endpoints, especially on APIs. It fetches JSON responses from @Burp_Suite history and creates a url paths wordlist from JSON keys. Github: github.com/s0md3v/dump/tr…

s0md3v's tweet image. Created a tool for finding hidden endpoints, especially on APIs.

It fetches JSON responses from @Burp_Suite history and creates a url paths wordlist from JSON keys.

Github: github.com/s0md3v/dump/tr…

ahamed morad reposted

Parameter Pollution: PHP internally uses parse_str() to parse parameters so it sees the char "[" & "_" as the same. PHP by default will use the last param as valid. In cases PHP is running on backend but front end validates the param, we can smuggle fake params to php. #BugBounty

PaulosYibelo's tweet image. Parameter Pollution: PHP internally uses parse_str() to parse parameters so it sees the char &quot;[&quot; &amp;amp; &quot;_&quot; as the same. PHP by default will use the last param as valid. In cases PHP is running on backend but front end validates the param, we can smuggle fake params to php. #BugBounty

Loading...

Something went wrong.


Something went wrong.