Mohammad

42 posts

Mohammad banner
Mohammad

Mohammad

@m0hammad_y4ser

Application Security Consultant @ https://t.co/d2Pfm2x1kq | OSWE "always forward, never backward."

Katılım Haziran 2021
722 Takip Edilen837 Takipçiler
Sabitlenmiş Tweet
Mohammad
Mohammad@m0hammad_y4ser·
The one mentality you must have in life is that regardless of what is in front of you, you still must grind.
English
0
1
4
1.3K
Mohammad retweetledi
Ahmed Abdel Rasoul🦅
Ahmed Abdel Rasoul🦅@0xbartita·
𝗧𝗶𝗿𝗲𝗱 𝗼𝗳 𝘂𝗽𝗱𝗮𝘁𝗶𝗻𝗴 𝗰𝗼𝗼𝗸𝗶𝗲𝘀 𝗶𝗻 𝗲𝘃𝗲𝗿𝘆 𝗥𝗲𝗽𝗲𝗮𝘁𝗲𝗿 𝘁𝗮𝗯? 🍪 Burp extension that auto-replaces expired cookies/headers — perfect for retesting old requests without manual copy-paste. 🔗github.com/0xbartita/Cook… #bugbountytip #bugbountytips #PenTest
English
1
9
52
4.2K
Ahmed Salah (00xA7md)
Ahmed Salah (00xA7md)@00xA7md·
Proud to have earned OSCP, OSWA, OSWP, and OSWE from Offensive Security Each cert was a new challenge and a sharpening of my skills Big thanks to Offensive Security for setting the bar high and inspiring specialists in the field #OffSec #CyberSecurity #Security #Hacking #Hacked
Ahmed Salah (00xA7md) tweet mediaAhmed Salah (00xA7md) tweet mediaAhmed Salah (00xA7md) tweet mediaAhmed Salah (00xA7md) tweet media
English
4
1
15
608
Mohammad
Mohammad@m0hammad_y4ser·
@spaceboy2O @mux0x they do not know that i can change the CPU register to AAAAAAAAAAAA...
English
0
0
1
56
Mohammad
Mohammad@m0hammad_y4ser·
Deep Link Hijacking to Full Account Takeover: A Complete Guide In this blog, I dive into how I exploited deep link vulnerabilities in Android applications to achieve full account takeover. Check it out here: @soliman_almansor/deep-link-hijacking-to-full-account-takeover-complete-guide-3074b7ba82e3" target="_blank" rel="nofollow noopener">medium.com/@soliman_alman
English
0
11
62
3K
Mohammad
Mohammad@m0hammad_y4ser·
@AliSayed199 كلسن الشوكولاته هتعزمني على قهوة 😂
العربية
0
0
1
21
Ali Sayed
Ali Sayed@AliSayed199·
انا بحب اصحابى الى دايما بيكونوا فاكرينى وقت السفر (صاحبى جالى شكولاتة و بن من الصين 😂)
Ali Sayed tweet media
العربية
2
0
8
317
𝕵𝖔𝖙𝖆 | jotita3
I’m looking forward to hearing updates about one of my best bugs being accepted as critical 9.1. 🔥💸 I feel great! Hard work pays off. Happy weekend, everyone! 😃 #bugbounty @Hacker0x01
𝕵𝖔𝖙𝖆 | jotita3 tweet media
English
7
1
112
3.4K
Mohammad
Mohammad@m0hammad_y4ser·
During a bug bounty engagement for a program with four distinct Android applications, I discovered that one of the applications exposes a deep link handler associated with the login functionality, utilizing the scheme `scheme://login?token=...`. Read the Comments ⬇️
Mohammad tweet mediaMohammad tweet mediaMohammad tweet media
English
16
33
329
25.1K
Mohammad
Mohammad@m0hammad_y4ser·
4. Impact: Full Account Compromise. Tips: If the target offers multiple Android applications and a vulnerability is identified in one, it is advisable to investigate whether the same or similar vulnerability exists across the other applications.
English
0
0
7
2.2K
Mohammad
Mohammad@m0hammad_y4ser·
3. With the stolen token, I successfully authenticated as the victim, leading to a full account takeover (ATO).
English
1
0
2
2.3K
Mohammad
Mohammad@m0hammad_y4ser·
@omidxrz use Nox if you have no WSL installed on your machine, for better experience, use the emulator of the android studio. one more thing, use the google pixel devices
English
1
0
2
409
Omid Rezaei
Omid Rezaei@omidxrz·
Is anyone here doing Android pentesting? I can’t use Genymotion anymore; it’s too unstable. Can you suggest an Android device for rooting, custom ROMs, and stuff like that?
Omid Rezaei tweet media
English
8
0
33
4.7K
dnelsaka
dnelsaka@joo_elsaka·
Deeplink bypass that worked with me payload :- `https://<button%20onclick=%22window.location.href='https:%2F%2Fevil.com'%22>Click%20Me</button>.com.cn`
dnelsaka tweet mediadnelsaka tweet media
English
4
21
165
9.9K