Mahmuud Ayman

378 posts

Mahmuud Ayman banner
Mahmuud Ayman

Mahmuud Ayman

@_0xhero1

Penetration tester || Bug hunter @bugcrowd

127.0.0.1 Katılım Eylül 2019
779 Takip Edilen2.9K Takipçiler
Sabitlenmiş Tweet
Mahmuud Ayman
Mahmuud Ayman@_0xhero1·
الحمدلله Found exposed AWS keys in a public repo report triaged on @Bugcrowd . Using Github Dork: org:Target aws_access_key_id
Mahmuud Ayman tweet media
9
19
352
12.2K
Mahmuud Ayman
Mahmuud Ayman@_0xhero1·
Just 2 days… and 3 duplicate findings 😅🔥 - Race Condition - Privilege Escalation (×2) Still early, still grinding with my team. @MahmoudEmam809 @youseftolba208 Valid is coming 💪🚀
Mahmuud Ayman tweet media
English
5
1
61
1.7K
Mahmoud Emam
Mahmoud Emam@MahmoudEmam809·
Took a break from bug bounty platforms thinking going external would save me from duplicates… turns out duplicates still got my address 😅
Mahmoud Emam tweet media
English
1
1
3
133
أسامة 🇵🇸
أسامة 🇵🇸@pent0ss·
مفيش احلى من إنك تنزل أجازة من الجيش تلاقى البونتى مستنياك 🤤😂 الحمد لله المنّان الوهاب ❤😍 First bounty at @Bugcrowd
أسامة 🇵🇸 tweet media
العربية
10
0
129
3.3K
Mahmuud Ayman retweetledi
Abdelhy khaled🦅
Abdelhy khaled🦅@cysky0x1·
Mastercard has been hacked successfully via a critical vulnerability. 🧘 Mission complete 💯🏂
Abdelhy khaled🦅 tweet media
English
12
31
1.8K
106.1K
Mahmuud Ayman retweetledi
Behi
Behi@Behi_Sec·
No bugs = keep going. Duplicate = keep posting. N/A = keep learning. Informative = keep going. Don't stop for nothing!
English
3
23
191
3.9K
Mahmuud Ayman retweetledi
Mj | Cybersecurity
Mj | Cybersecurity@mj_nw01·
سلسلة كل يوم شرح ثغرة بسيطة: Day3 ثغرة تعداد المستخدم : التعداد ان الخادم يرد اذا اليوزر موجود بقاعده البيانات او لا اختبارها : ١- ابحث عن لوحة تحكم وجرب يوزرات شائعة مثل admin , test , root , toor ٢- ابحث عن تسريب لليوزرات من خلال api ملاحظة (مواقع الwordpress يتم اعتبارها معلوماتيه) - تأكد من الثغرات الغير مقبولة المكافاة من ٥٠ الى ٢٠٠$ او على حسب البرنامج
Mj | Cybersecurity tweet mediaMj | Cybersecurity tweet mediaMj | Cybersecurity tweet media
Mj | Cybersecurity@mj_nw01

سلسلة كل يوم شرح ثغرة بسيطة : Day2 Session Fixation ثغرة: اختبارها: ١- سجل دخول لحسابك بالموقع نفذ اي اجراء على حسابك كتعديل بريد ..الخ ٢- اعترض الطلب او راقب الرابط من المتصفح تاكد من وجود رمز الجلسة بالURL ٣- افتح الرابط مع رمز الجلسة بمتصفح مخفي اذا تم دخولك لحسابك تقدر تبلغ المكافاة من ٤٠٠ الى ٢٥٠٠$ او على حسب البرنام

العربية
5
10
176
29.5K
Mahmuud Ayman retweetledi
the_IDORminator
the_IDORminator@the_IDORminator·
Weird graphQL IDOR / access control bypass: In this one, graphQL would check the "tin" (tax identification number), if supplied, against the Bearer token. If the Bearer did not have access to the tin, you would get access denied. Normal stuff there. So my thought was, how could I make the server still lookup the tin value without the access check? It regularly expected: \"tin\" This causes the server, since "tin" is present, to check access control prior to returning data. What worked was: \"tin\\\"\" So adding \\\" after tin bypassed the access control logic (for some reason), meanwhile the graphQl query still ran and sent back the PII for any TIN I sent it. #bugbounty is just strange sometimes. Some of the battle is finding neat endpoints and places, and some of it is endless tinkering.
the_IDORminator tweet media
English
17
64
609
19.1K
Mahmuud Ayman retweetledi
Mo Salah🇵🇸
Mo Salah🇵🇸@0x_MoSalah·
إِنَّ اللَّهَ وَمَلَائِكَتَهُ يُصَلُّونَ عَلَى النَّبِيِّ ۚ يَا أَيُّهَا الَّذِينَ آمَنُوا صَلُّوا عَلَيْهِ وَسَلِّمُوا تَسْلِيمًا
العربية
0
1
17
406
Mahmuud Ayman retweetledi
the_IDORminator
the_IDORminator@the_IDORminator·
Race Condition IDOR, $36,750 Where automation fails is often in the gray areas. In the case of this bug, an IDOR existed by integer "orderId", which would allow viewing and hijacking someone else's order by simple swapping the order number - but ONLY IF the order had not yet completed. We see here that the order is 10099780. If we increment up by 1 to 10099781, it may have said "not found" (404) or access denied (403), and we keep incrementing upwards to maybe 10099788 (eight orders higher), and suddenly we get data back (200). You tinker around a bit more, come back to that same number, and now it says access denied (403). Hrmm. So you increment up again, and get another hit, which again turns to access denied in a matter of seconds or minutes. After some pondering, you realize it turns out that once an order is completed, the access control kicks in, but not while the order is still in progress. Well ain't that fun. From an attackers perspective, what can we do with this? What is the risk? Imagine you could change the shipping address on someones uncompleted order and intercept the product they are about to pay for. Or increasing the quantity of the product they are purchasing. Suddenly you have a warehouse full of goods you didn't pay for. That's not good for the company! Perhaps automated tooling was used to scan this, but if no other orders were in progress in lower environments, maybe it got missed. Sometimes things just don't get found until they are in production for so many reasons. If you are gonna do some #hacking, may as well do it on #bugbounty programs and get paid for it instead of wasting time on HTB and random labs. "Hey random guy, how did you get so good at hammering?" Random Guy: "I used the hammer every day for 5 years."
the_IDORminator tweet media
English
11
88
827
31.6K
Mahmuud Ayman retweetledi
Behi
Behi@Behi_Sec·
How to automate bug bounty tasks: - Pick a target. - Use your methodology and write down every action you take. - Once you are finished, check the list and ask yourself which actions you repeated multiple times. - Use AI to write mini-scripts to automate those specific actions. Thank me later.
English
9
14
195
10.3K
Mahmuud Ayman
Mahmuud Ayman@_0xhero1·
Alhamdulillah 🙏, Reported RCE (CVE-2025-55182) in a private program. Marked as Duplicate, still a great learning experience! #BugBounty #CyberSecurity
Mahmuud Ayman tweet media
English
7
2
119
5.7K
GLIMZY
GLIMZY@Abdullah3870_·
@_0xhero1 معوض ان شاءالله
العربية
1
0
1
92
Mahmuud Ayman
Mahmuud Ayman@_0xhero1·
@Azx7af I mainly focus on private programs. I understand This CVE in public programs are often duplicates. Even if there’s no bounty, I’ll earn points.
English
0
0
1
238
AzraelTheHacker
AzraelTheHacker@Azx7af·
@_0xhero1 I think every report on CVE - 2025 -55182 get duplicate because now they know about the vulnerability.
English
1
0
2
355