elldeeboo2's profile picture. Cyber Security Engineer

Ahmed ElDeeb

@elldeeboo2

Cyber Security Engineer

ปักหมุด

Work on a program for 9 months , The result is a good understanding of the site, despite the number of 9,000 vulnerabilities reported I am still able to report critical reports happy hunting $$$$$ 🔥

elldeeboo2's tweet image. Work on a program for 9 months  ,
The result is a good understanding of the site,
despite the number of 9,000 vulnerabilities reported I am still able to report critical reports 
happy hunting $$$$$ 🔥
elldeeboo2's tweet image. Work on a program for 9 months  ,
The result is a good understanding of the site,
despite the number of 9,000 vulnerabilities reported I am still able to report critical reports 
happy hunting $$$$$ 🔥
elldeeboo2's tweet image. Work on a program for 9 months  ,
The result is a good understanding of the site,
despite the number of 9,000 vulnerabilities reported I am still able to report critical reports 
happy hunting $$$$$ 🔥

Hunter .. Gun & Bounty

elldeeboo2's tweet image. Hunter ..
Gun & Bounty

When you are sure of your decision. You can escalate . 👍 #bugbounty

elldeeboo2's tweet image. When you are sure of your decision.
You can escalate . 👍

#bugbounty

Ahmed ElDeeb รีโพสต์แล้ว

6000+ Private Nuclei Templates t.me/ExploitQuest/42


Ahmed ElDeeb รีโพสต์แล้ว

SQLi Automation by @coffinxp7 tool Automation script github.com/freelancermija… #sqli #BugBounty


Ahmed ElDeeb รีโพสต์แล้ว

من الحاجات اللي كنت مهتم بيها مؤخرا هي Dark Web OSINT و ازاي اقدر ادور علي المعلومة علي الDark Web او اتأكد من صحتها او مصدرها , فالثريد ده هشارك معاكوا شوية معلومات لذيذة عن الموضوع و فالاخر هحط مصادر لو حد حابب يتعمق فالموضوع ده

kareemwalid17's tweet image. من الحاجات اللي كنت مهتم بيها مؤخرا هي Dark Web OSINT و ازاي اقدر ادور علي المعلومة علي الDark Web او اتأكد من صحتها او مصدرها , فالثريد ده هشارك معاكوا شوية معلومات لذيذة عن الموضوع و فالاخر هحط مصادر لو حد حابب يتعمق فالموضوع ده

Ahmed ElDeeb รีโพสต์แล้ว

Account takeover techniques

pwn4arn's tweet image. Account takeover techniques

Ahmed ElDeeb รีโพสต์แล้ว

Cloudflare XSS bypass : ">%20<img src=o onerror=alert``>// github.com/Edr4/XSS-Bypas…

m0uka_Dz's tweet image. Cloudflare XSS  bypass :
&quot;&amp;gt;%20&amp;lt;img src=o onerror=alert``&amp;gt;//

github.com/Edr4/XSS-Bypas…

Ahmed ElDeeb รีโพสต์แล้ว

ثغرة Deeplink من الثغرات ال Android الذيذه جدا وده رايت اب انا كتبتها حالل فيها تلات apps vulnerable لثغرة deeplink وفيها شرح للثغره علي قد كده link writeup: medium.com/@Sisi0x/androi… وكمان سايبلك لكن تحميل apps علشان تطبق عليهم ان شآء الله


Ahmed ElDeeb รีโพสต์แล้ว

1 install waymore tool waymore.py -i domain -mode U And send all the results to burp 2 start bing and google dorking on the same proxy browser to get all the results to burp 3 install GAP extension and then send the target to GAP there’s lot to do, this start


من فتره للتانيه بحاول ادخل اهانت على h1 , BC كنوع من التغيير . ولكن كل مره اخد فيها N/A او Duplicate بشكل غير طبيعى . ارجع تانى اهانت ف الاماكن بتاعتى المتعود عليها . سؤال هنا مهم ! هل منطقى اخد duplicate على Report اتعمل من سنه كامله ؟

elldeeboo2's tweet image. من فتره للتانيه بحاول ادخل اهانت على h1 , BC 
كنوع من التغيير . 
ولكن كل مره اخد فيها N/A او Duplicate 
بشكل غير طبيعى . ارجع تانى اهانت ف الاماكن بتاعتى المتعود عليها .

سؤال هنا مهم !   هل منطقى اخد duplicate على Report اتعمل من سنه كامله ؟

Ahmed ElDeeb รีโพสต์แล้ว

Embed A Malicious Executable in a Normal PDF or EXE : medium.com/@sam.rothlisbe…

binitamshah's tweet image. Embed A Malicious Executable in a Normal PDF or EXE : medium.com/@sam.rothlisbe…

Ahmed ElDeeb รีโพสต์แล้ว

Mssql Stacked injections Tips #sqli #bugbountytips

sirifu4k1's tweet image. Mssql Stacked injections Tips
#sqli #bugbountytips

Ahmed ElDeeb รีโพสต์แล้ว

Automating SSRF using Autorepeater In the window of Auto-Repeater, we can specify some regex to find urls. 👉 https?:\/\/(www\.)?[-a-zA-Z0–9@:%._\+~#=]{1,256}\.[a-zA-Z0–9()]{1,6}\b([-a-zA-Z0–9()@:%_\+.~#?&//=]*) By:@akaclandestine #bugbountytips #BugBounty


Ahmed ElDeeb รีโพสต์แล้ว

Tip for Stored XSS Bypass on Profile Uploader: +add magic number (jpg , jpeg) +bypass file extention Protection #BugBounty #bugbountytips #bugbountytip #Pentesting

R00TDR's tweet image. Tip for Stored XSS Bypass on Profile Uploader:
+add magic number (jpg , jpeg)
+bypass file extention Protection
#BugBounty
#bugbountytips
#bugbountytip
#Pentesting
R00TDR's tweet image. Tip for Stored XSS Bypass on Profile Uploader:
+add magic number (jpg , jpeg)
+bypass file extention Protection
#BugBounty
#bugbountytips
#bugbountytip
#Pentesting

Ahmed ElDeeb รีโพสต์แล้ว

“How I got RCE on 403 admin.redacted.org” by Shivpratapsingh medium.com/@shivpratapsin…

Alra3ees's tweet image. “How I got RCE on 403 admin.redacted.org” by Shivpratapsingh
medium.com/@shivpratapsin…

Ahmed ElDeeb รีโพสต์แล้ว

When you are hunting for blind XSS. Go to forget password and add admin@company .com and add your blind XSS payload on the header. Easy way and it will logged on admin log, if he checked his account you will exploit his account. #bugbountytips

Alra3ees's tweet image. When you are hunting for blind XSS. Go to forget password and add admin@company .com and add your blind XSS payload on the header.
Easy way and it will logged on admin log, if he checked his account you will exploit his account.
#bugbountytips

Loading...

Something went wrong.


Something went wrong.