@0xmagdy Profile picture

Mohamed Magdy

@0xmagdy

cybersecurity Researcher

Joined September 2017
Similar User
Fares photo

@_2os5

SAFE photo

@0x21SAFE

Alsanosi photo

@01alsanosi

Kareem Alsadeq photo

@AlsadeqKareem

daoud youssef photo

@daoud_youssef

Mahbob Alam 🇧🇩 photo

@EmptyMahbob

Rohan_lew photo

@Rohan_Lew

Abdalla Abdelrhman photo

@0x2nac0nda

Mohd Waseyuddin photo

@waseyuddin

conqueror - Ahmed Qaramany photo

@c0nqr0r

AbdulRahman🇮🇳 photo

@abdulx01t

Tushal Padsala photo

@PadsalaTushal

Zin Min Phyo photo

@zin_min_phyo

black viru5 photo

@Yazeed_oliwah

🇪🇬Mahmoud samaha🇵🇸 🔻 🪂 photo

@0x__4m

Mohamed Magdy Reposted

The Slides of (The Art Of Authentication Bypass) on @bsidesahmedabad You will find a lot of useful tips and tricks that will help you bypass some admin panels😉 docs.google.com/presentation/d… Thanks to @bsidesahmedabad for giving this topic chance #bugbounty #bugbountytips #infosec

Tweet Image 1

Mohamed Magdy Reposted

الحلقة الرابعه مع Souhaib Naceri @h4x0r_dz واتكلمنا فيها عن حاجات كتير وتجربتة في الوصول لـ LHE بتاع هاكرون وفيه نصايح جداً مهمة لتطوير مستواك، وحاجات تانية كتير تقدر تشوفها من هنا : youtu.be/uuxACNbB6Zk #BugBounty

Tweet Image 1

Mohamed Magdy Reposted

على خطى قائده #يحيى_السنوار مجاهد من القسام يقاتل حتى آخر نفس من حياته ... ما أروع وأشرف هؤلاء الرجال، الذين يسطرون بدمائهم قصص البطولة والفداء من أجل دين الله ودفاعًا عن #القدس . ♥️


حسبي الله ونعم الوكيل مشاهد تقطع القلب

This post is unavailable.

Mohamed Magdy Reposted

رائع جدا 👍🏻👏: عزيزي مختِبر الاختراق : هنا تحصل 100 سؤال خاص بالـWeb Security : -تعريف الثغرة -مثال عليها -كيف تمنعها ..الخ github.com/InfoSecWarrior…


DOM-based XSS xss%27;prompt`xss`//

Tweet Image 1

Mohamed Magdy Reposted

Request smuggling is an amazing bug class! But I barely ever did more than running Request Smuggler. So I've analysed tens of reports and in this video, I'll break down the most common root causes and I'll give you some ideas for future research. Enjoy!


Mohamed Magdy Reposted

If you Are Interested In Developing your Hacking skills Read some amazing @BlackHatEvents pdf <3. Demo Google dork: site:blackhat.com intext:"RCE" filetype:pdf #CyberSecurity #BugBounty #infosec

Tweet Image 1

Mohamed Magdy Reposted

Are your excited for 2.0 version of "How to JS for Bug Bounties" kongsec.medium.com/how-to-js-for-… #kongsec #bugbounty

Tweet Image 1

Mohamed Magdy Reposted

- Simple tip for port scan 1) after enumerat your subdomains save in subs.txt 2) run this command "cat subs.txt | dnsx -a -ro | naabu -silent -top-ports 1000 -exclude-ports 80,443,21,22,25 -o ports.txt" #bugbountytips #bugbounty #infosec #cybersec

Tweet Image 1

Mohamed Magdy Reposted

A new Executive Offense newsletter is out! Episode #12 - The Training Landscape Pt. 1 (link 👇) executiveoffense.beehiiv.com/p/cybersecurit… Don't forget to subscribe!

Tweet Image 1

easy win😀 try sign up by admin@domain.com >> is not allowed bypass this By admin@DOMAIN.COM >> account created #Bounty #bugbounty #infosec

Tweet Image 1

Yay, i was awarded 750 $ bounty from @zoho 2 XSS and 1 default credentials #Bounty #bugbounty #infosec

Tweet Image 1

Mohamed Magdy Reposted

ان شاء الله قررت انزل الكورس بتاع Udemy علي youtube للي هيبقي محتاجة ان شاء الله. youtube.com/playlist?list=… *لا تنسوى اخوانكم من الدعاء*

Tweet Image 1

Mohamed Magdy Reposted

this is my favourite error message by far iykyk

Tweet Image 1

Mohamed Magdy Reposted

1:- Use @fasthm00 github.com/Leoid/Matchand… 2:- Import to burpsuite match and replace. 3:- Run gospider. gospider -s url -a -w --sitemap -r -c 100 -d 8 -p http://127.0.0.1:8080 4:- The Blind xss payload will added automatically by burp and gospider. Finally:- 4 BLIND XSS REPORTS.

Tweet Image 1

Mohamed Magdy Reposted

If you discover an oracle web app, you can use this payload EHY01%27OR+1%3d1+AND+NVL(ASCII(SUBSTR((SELECT+chr(78)%7c%7cchr(69)%7c%7cchr(84)%7c%7cchr(83)%7c%7cchr(80) )%7c%7cchr(65)%7c%7cchr(82)%7c%7cchr(75)%7c%7cchr(69)%7c%7cchr(82)+FROM+DUAL)%2c9%2c1))%2c0) %3d82-- #BugBounty

Tweet Image 1

حياه أفضل بدون فيسبوك 😀


Mohamed Magdy Reposted

katana -list url.txt -c 50 -d 4 -jc -kf | grep "=" | uro | qsreplace 'xss'| httpx | anew xss.txt knoxnl -i xss.txt -X BOTH -afb -s -o xssoutput.txt

#DidYouKnow You don't need to set absolutely anything to get a Blind #XSS w/ KNOXSS! It does it all for you in every scan, in every parameter of the URL or POST body. Guys like @Alra3ees have found a lot of XSS that way in the past. KNOXSS.me Take XSS seriously.



Loading...

Something went wrong.


Something went wrong.