@eman_yazji Profile picture

Eman Elyazji

@eman_yazji

Bug hunter @Hacker0x01 ,,, @bugcrowd

Similar User
🇪🇨🍫 photo

@bxmbn

0xRAYAN photo

@0xRAYAN7

Godfather Orwa 🇯🇴 photo

@GodfatherOrwa

Abdelrhman Allam 🇵🇸 photo

@sl4x0

Fares photo

@_2os5

Rahmat Qurishi photo

@RahmatQurishi

Tur.js photo

@Tur24Tur

Hammad 🇵🇰🇵🇸 photo

@Hammad7361

Ravindra Lakhara 🇮🇳 photo

@RootxRavi

Mahmoud Hamed photo

@7odamoo

Deepak bug_vs_me photo

@bug_vs_me

Lu3ky13 ⚡️⚡️ photo

@lu3ky13

Nihad photo

@nihad_rekany

🇸🇦 ROOD | GOAT photo

@0x_rood

Alsanosi photo

@01alsanosi

Pinned

#bugbountytips Account Takeover When you sign up, try to register using existing email by adding \n at the end, it could sign you into someone's account/overwrite his account. ✍️ Example: {"email":"eman@example.com"} ↓ {"email":"eman@example.com\n"}

Tweet Image 1
Tweet Image 2

Eman Elyazji Reposted

الحمدلله تأهلنا مع ال32 فريق الى دور المجموعات وضمن الفرق الاساسية (افضل 8 فرق) في مسابقة كأس العالم هكر ون 2024 🇸🇦💪 Saudi Arabia qualified to group stage with 32 teams and as one of the main teams for the next round (Top 8) 🇸🇦💪 #AWC2024

Tweet Image 1

Eman Elyazji Reposted

تم قبول ممثلي المملكة العربية السعودية 🇸🇦 لمسابقة AWC 2024 هكر ون @Hacker0x01 🏆 المشاركين: @AMakki1337 @0x_rood @eman_yazji @r00t_nasser @0xRaw @0xRAYAN7 @Ahmed0Makki @Ibrah1m_0x @leetibrahim @AlHomaidNoor @abdlah_md @stuipds @Liliexx2 @omarzzu @9yk @Dr_Ro0T

Tweet Image 1

Eman Elyazji Reposted

جاهزين لكأس العالم هكر ون ٢٠٢٤ 🔥 🏆 للمشاركة وتمثيل المملكة العربية السعودية 🇸🇦 يرجى تعبئة النموذج: docs.google.com/forms/d/e/1FAI…

Tweet Image 1

Eman Elyazji Reposted

الحمدلله تأهلنا من دور المجموعات بأصعب مجموعة في كأس العالم 2023 هكر ون 🔥💪🇸🇦 شكرا لكل اللي شارك معنا في المسابقة وتمنياتكم لنا بالتوفيق في المباريات القادمة. @AMakki1337 (C) @eman_yazji @0xRAYAN7 @Ahmed0Makki @stuipds @leetibrahim @0xRaw @aa_8989 @0x_rood @0xNasser_

Tweet Image 1

Eman Elyazji Reposted

Today marks the start of the 2023 #AmbassadorWorldCup! 29 teams, and over 600 hackers are taking on the challenge to help our AWC partners @OpenSea, @ShopifyEng, Epic Games, @TheParanoids and @stripe strengthen their security. Who will come out on top? bit.ly/400LpGY

Tweet Image 1

#bugbountytips Account takeover by bypassing rate limit When you try to brute force the OTP rate limit will stop you, try to add this header to bypass it ✍️ X-Forwarded-For: 127.0.0.1


Eman Elyazji Reposted

#bugbountytips Sometimes when you visit a website using burp suite cloudflare stops you, but when you disable the proxy it works. here is how to bypass it using burp suite ✍️ Enable match and replace with the following: pastebin.com/raw/HRZzeZLJ #Cloudflare #BugBounty

Tweet Image 1
Tweet Image 2

Eman Elyazji Reposted

تم اختيار ممثلي المملكة العربية السعودية بمسابقة World Cup 2023 هكر ون 🏆🇸🇦 - @AMakki1337 (C) - @0xRaw - @0xRAYAN7 - @aa_8989 - @0xNasser_ - @eman_yazji - @Hattan_515 - @r00t_nasser - @3zizMe_ - @0x_rood - @GodfatherOrwa - @Ahmed0Makki - @Mohamed87Khayat


When you hunt on a shopping website try this trick: Add these items to your cart Item 1: 50$ Item 2: 49$ Change the quantity of Item 2 to -1 (negative amount) Subtotal: 1$ With this trick you can buy Item 1 for 1$ #bugbountytips #bugbountytip #bugbounty


Hacker Cup @Bugcrowd 😎🔥 With the best collaborator in the world @AMakki1337 #BugBounty #bugbountytips

Tweet Image 1

Sometimes parameter pollutions can also lead to IDORS: if GET/api_v1/docs? user_id=youruserid Send it like this: GET /api_v1/docs? user_id=youruserid&user_id=anotheruserid or, GET /api_v1/docs? user_id=anotheruserid&user_id=youruserid Rare but can be tried:) #bugbountytips


Eman Elyazji Reposted

الحمدلله حصلت على المركز الثاني في كأس منصة مكافآت الثغرات في حدث بلاك هات🥈 I placed 2nd place in Bug Bounty Cup during Black Hat MEA event🥈 #bugbountytips #bugbountytip #bugbounty #BHMEA22 #بلاك_هات22 @Faisal @malobeiwi @SAFCSP @BugBountySA @Blackhatmea

Tweet Image 1

Eman Elyazji Reposted

Can you spot the vulnerability? 🔎 Show us how you'd be able to read ANY local file you want in the comments 👇 The best explanation gets a 25€ SWAG voucher! 👕

Tweet Image 1

SSRF Tip If you found something similar to this in your request body {"endpoint":"/adduser","name:"test"} add @burpcollab.com before / {"endpoint":"@burpcollab.com/adduser"} in the backend it will be "https://website@burpcollab.com/adduser" #bugbountytips

Tweet Image 1
Tweet Image 2

Loading...

Something went wrong.


Something went wrong.