Mohamed Dief  (@demoniaslash) 's Twitter Profile
Mohamed Dief 

@demoniaslash

Cyber security researcher, Backend developer, Building the next shopping platform @dealxco

ID: 1146092228235931650

linkhttps://hackerone.com/demonia calendar_today02-07-2019 16:24:15

223 Tweet

295 Followers

85 Following

Mohamed Dief  (@demoniaslash) 's Twitter Profile Photo

I just published a blog post about how npm could be used for privilege escalation in windows, show-casing some CLI and desktop security issues medium.com/@demonia/windo…

Mohamed Dief  (@demoniaslash) 's Twitter Profile Photo

I’ve been deep into desktop app pentesting for bug bounties and wanted to share one of the tools I built along the way. Walker is designed to find secrets in binaries using ReGex, do uncover hidden attack surfaces too like URLs in desktop apps. github.com/DEMON1A/Walker

𝕏 Bug Bounty Writeups 𝕏 (@bountywriteups) 's Twitter Profile Photo

How I do my recon and end up finding hidden assets and vulnerabilities before anyone else Pt.1 medium.com/@demonia/how-i… #bugbounty #bugbountytips #bugbountytip

Mohamed Dief  (@demoniaslash) 's Twitter Profile Photo

Inspired by Zwink I built zzl, an enhanced version of his script sslDomains_v3.py with performance improvements and more features <3 github.com/DEMON1A/zzl

Inspired by <a href="/_zwink/">Zwink</a> I built zzl, an enhanced version of his script sslDomains_v3.py with performance improvements and more features &lt;3

github.com/DEMON1A/zzl
Mohamed Dief  (@demoniaslash) 's Twitter Profile Photo

I just published a blog post showing how you can effectively use subwiz by Hadrian and automate the subdomains prediction process for your recon setup medium.com/@demonia/utili…

Mohamed Dief  (@demoniaslash) 's Twitter Profile Photo

Hunting hackers is much more fun than bug bounty, I been ruining a hacker group called (NIGNOG) operation for days now, Every single time they re-claim access to the servers my automation just takeover their servers again, I expected more from the creators of FritzFrog malware

Hunting hackers is much more fun than bug bounty, I been ruining a hacker group called (NIGNOG) operation for days now, Every single time they re-claim access to the servers my automation just takeover their servers again, I expected more from the creators of FritzFrog malware
Mohamed Dief  (@demoniaslash) 's Twitter Profile Photo

Even though it wasn't considered a security issue, this report is one of my favourites so far, Love how clean and well explained this source code review is hackerone.com/reports/3133379

Oblivion Sage (@theoblivionsage) 's Twitter Profile Photo

New disclosure: CRLF Injection in curl via --proxy-header While not a vuln by design, it's still dangerous in insecure usage. PoC + HackerOne report + curl team response github.com/Oblivionsage/c… hackerone.com/reports/3133379 #bugbounty #infosec #curl #CWE93 #hackerone

New disclosure: CRLF Injection in curl via --proxy-header
While not a vuln by design, it's still dangerous in insecure usage.
PoC + HackerOne report + curl team response
github.com/Oblivionsage/c…
hackerone.com/reports/3133379

#bugbounty #infosec #curl #CWE93 #hackerone
Philippe Delteil (@philippedelteil) 's Twitter Profile Photo

I reported a DNS takeover, the POC is a TXT DNS record. Report says "dig TXT poc.domain". Triager opens domain in the browser. Claims is not reproducible... What!?

I reported a DNS takeover, the POC is a TXT DNS record. Report says  "dig TXT poc.domain".

Triager opens domain in the browser. Claims is not reproducible...

What!?
Gabriele Berton (@gabriberton) 's Twitter Profile Photo

Super interesting take from one of the greatest hackers He says Mythos is not as good as they claim, because zero-day vulnerabilities are not that hard to find for skilled hackers I'm far from the hacking world but sounds reasonable Any thought?

Super interesting take from one of the greatest hackers

He says Mythos is not as good as they claim, because zero-day vulnerabilities are not that hard to find for skilled hackers

I'm far from the hacking world but sounds reasonable

Any thought?