Open in app

Sign In

Write

Sign In

Cysky0x1
Cysky0x1

153 Followers

Home

Lists

About

22 hours ago

Account Takeover By OTP Bypass

“اللهم صلًّ وسلم على نبينا محمد” Hello Hunters! My name is Abdelhy khaled, I am Security Researcher , It’s been a while since my last write up, so i decide to share a fun experience that i had while hunting on a private program. What is OTP? OTP stands for one-time password web application insert this…

Account Takeover

2 min read

Account Takeover By OTP Bypass
Account Takeover By OTP Bypass
Account Takeover

2 min read


Sep 10

How i found creative bug and how able to change the impact from low to high?

Hello everyone !!! Hope all are good and fine. I’m back again, in this is my report i well show How i found creative bug and how able to change the impact from low to high? Are you exciteabile???? Let’s go

Account Takeover

3 min read

How i found creative bug and how able to change the security risks from low to high?
How i found creative bug and how able to change the security risks from low to high?
Account Takeover

3 min read


Sep 2

Full Account takeover due to OAuth misconfiguration

Hello Amazing Hackers… Abdelhy khaled is Here In this in Article and I will talk about how I found Account Squatting due to OAuth misconfiguration in public bug bounty program Brief about what is an Account takeover vulnerability? OAuth is an authorization framework used to identify and authenticate users for an…

Account Takeover

3 min read

Full Account takeover due to OAuth misconfiguration
Full Account takeover due to OAuth misconfiguration
Account Takeover

3 min read


Aug 21

Registration captcha bypass

Hello Hunters! It’s been a while since my last write up, so i decide to share a fun experience that i had while hunting on a private program. What the hell is a captcha? From my point of view: The captcha solver is mostly used to avoid bots and ensure…

Captcha Bypass

2 min read

Registration captcha bypass
Registration captcha bypass
Captcha Bypass

2 min read


Jul 19

My methodology to bypass CSRF token with 5 Methods

Hello folks! My name is Abdelhy khaled, I am Security Researcher & Bug Bounty Hunter in this blog i will show my methodology to bypass csrf token with 5 different methods What is Cross-Site Request Forgery (CSRF)? Cross site request forgery is a web application vulnerability attack vector that basically tricks the web browser into performing…

Csrf

5 min read

My methodology to bypass CSRF token with 5 Methods
My methodology to bypass CSRF token with 5 Methods
Csrf

5 min read


Jun 1

MY first P2- Vulnerability IDOR (Insecure Direct Object References)

Hello folks! My name is Abdelhy khaled, I am Security Researcher & Bug Bounty Hunter .I found an IDOR on ticket support which allows me to view any ticket submitted to the support team by the User . So, before going into deep let’s have a look what is IDOR? What is IDOR? …

Idor

3 min read

MY first P2-IDOR (Insecure Direct Object References)
MY first P2-IDOR (Insecure Direct Object References)
Idor

3 min read

Cysky0x1

Cysky0x1

153 Followers
Following
  • Mostafa Elguerdawi

    Mostafa Elguerdawi

  • Immunefi

    Immunefi

  • Yasmeena Rezk

    Yasmeena Rezk

  • M7arm4n

    M7arm4n

  • Osama Hussein

    Osama Hussein

See all (37)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams