El Mehdi (@elmehdimee) 's Twitter Profile
El Mehdi

@elmehdimee

bug bounty hunter, bugcrowd.com/elmahdi , hackerone.com/elmahdi , elmehdi.me

ID: 1679092593676746753

calendar_today12-07-2023 11:37:40

729 Tweet

897 Followers

364 Following

Asem Eleraky (@melotover) 's Twitter Profile Photo

Full Account takeover in Microsoft via Client-side Attack in Login Flow New detailed writeup + Full PoC video. I hope you enjoy reading! melotover.medium.com/escalating-imp… #BugBounty #bugbountytips #infosec

Full Account takeover in Microsoft via Client-side Attack in Login Flow 

New detailed writeup + Full PoC video. I hope you enjoy reading!
melotover.medium.com/escalating-imp…

#BugBounty #bugbountytips #infosec
Dirk-jan (@_dirkjan) 's Twitter Profile Photo

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…

Critical Thinking - Bug Bounty Podcast (@ctbbpodcast) 's Twitter Profile Photo

We announced the Critical Research Lab this week. And for our FIRST post, we got Jorian's: - Exploiting Web Worker XSS with Blobs Go check it out! lab.ctbb.show/research/Explo…

RootSys (@rootsysat) 's Twitter Profile Photo

🚨 Next.js and the Mutated Middleware [CVE-2025-57822] - a powerful SSRF primitive enabling full control over HTTP methods, headers & URLs. See how a subtle middleware bug can result in a high-impact vulnerability: 🔗 blog.rootsys.at/posts/nextjs-a… #AppSec #Nextjs #SSRF

Veria Labs (@verialabs) 's Twitter Profile Photo

🧵 We just discovered critical RCE vulnerabilities in popular AI coding tools including Claude Code and Gemini CLI. The issue: These tools use OAuth for MCP (Model Context Protocol) authentication, but don't validate authorization URLs from servers.

harisec (@har1sec) 's Twitter Profile Photo

I wrote a blog post about enumerating and testing tool usage in web applications that use LLMs: invicti.com/blog/security-…

Patrik Fehrenbach (@itsecurityguard) 's Twitter Profile Photo

Ever stumbled on an AEM box and thought “ok… now what?” 😏 We dropped hopgoblin — new research + tool XXE, SSRF, XSS & more (CVE-2025-54251, -54249, -54252, -54250/47/48/46). 👀 time for some crits eh? 👉 github.com/assetnote/hopg…

Ever stumbled on an AEM box and thought “ok… now what?” 😏 

We  dropped hopgoblin — new research + tool  XXE, SSRF, XSS & more (CVE-2025-54251, -54249, -54252, -54250/47/48/46). 👀 

time for some crits eh?

👉 github.com/assetnote/hopg…
Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

In a shameless effort to promote my book. I've crafted some very special vectors for you. If you like them please purchase my book to read more. amazon.com/dp/B0BRD9B3GS

In a shameless effort to promote my book. I've crafted some very special vectors for you. If you like them please purchase my book to read more.

amazon.com/dp/B0BRD9B3GS
Luke Turvey (@turvsec) 's Twitter Profile Photo

I just released Flareprox 🔥 A Cloudflare based Fireprox alternative that allows you to route HTTP traffic through Cloudflare, to gain mostly unique IP Addresses, to avoid detection and blocks.

I just released Flareprox 🔥

A Cloudflare based Fireprox alternative that allows you to route HTTP traffic through Cloudflare, to gain mostly unique IP Addresses, to avoid detection and blocks.
YS (@yshahinzadeh) 's Twitter Profile Photo

I’ve been hunting on H1 for almost 3 years, ranked #18 in 2025, have always tried to contribute positively to the hacker community. I’ve earned around $500k in bounties and was on the road to $1M. Yet I don’t even have HSM, and I feel I haven’t been recognized as I should 1/4

I’ve been hunting on H1 for almost 3 years, ranked #18 in 2025, have always tried to contribute positively to the hacker community. I’ve earned around $500k in bounties and was on the road to $1M. Yet I don’t even have HSM, and I feel I haven’t been recognized as I should 1/4
A’ (@cursedenzo) 's Twitter Profile Photo

كلمات الماضي ديالو وقفنا عليها من بعد سنين. And still no change in the big 2025 #GENZ212 #Morocco

Damian Strobel (@damian_89_) 's Twitter Profile Photo

Interested in Spring Boot Actuators in the context of bug bounty hunting? I wrote something - nothing new - just some insights ;) Article: dsecured.com/en/articles/sp… Retweet appreciated! Dont expect 0days or some fancy magic.

sudi (@sudhanshur705) 's Twitter Profile Photo

Found an RCE in Google Web Designer :) Very similar to the CSS Injection to RCE found by Bálint Magyar. sudistark.github.io/2025/09/23/RCE…

Pop Base (@popbase) 's Twitter Profile Photo

At least three people have been killed in Morocco after police opened fire on a crowd of protesters. The Gen-Z-led demonstrations are rooted in public frustration over poor healthcare, education, and public services — and fueled by anger at the government’s decision to

At least three people have been killed in Morocco after police opened fire on a crowd of protesters. 

The Gen-Z-led demonstrations are rooted in public frustration over poor healthcare, education, and public services — and fueled by anger at the government’s decision to
watchTowr (@watchtowrcyber) 's Twitter Profile Photo

The watchTowr Labs team is back, providing our full analysis of the Oracle E-Business Suite Pre-Auth RCE exploit chain (CVE-2025-61882). Enjoy with us (or cry, your choice..) labs.watchtowr.com/well-well-well…

shubs (@infosec_au) 's Twitter Profile Photo

As a homage to the work of Blaklis, our Security Researcher Tomais debuts his first research post on reverse engineering a critical unauthenticated RCE in Magento (SessionReaper) CVE-2025-54236 at Searchlight Cyber: slcyber.io/assetnote-secu…

Vitor Falcão "busfactor" (@busf4ctor) 's Twitter Profile Photo

A few months ago, I began studying bug bounties extensively. I've made my list public, and you can submit links to help expand it! docs.google.com/spreadsheets/d…

TESS (@armansameer95) 's Twitter Profile Photo

Let's revive AEM vulnerabilities. 🧵 #BugBounty I made ($$,$$$) 5 digit bounties after reading the following blog post from Assetnote (slcyber.io) slcyber.io/assetnote-secu…