Abdullah Nawaf (HackerX007)🇯🇴 (@xhackerx007) 's Twitter Profile
Abdullah Nawaf (HackerX007)🇯🇴

@xhackerx007

Hackerx007
Bug hunter
FB/Twitter/Mail.ru HOF
41 Bugcrowd rank
11 Bugcrowd P1 rank with 226 p1 :)
In love with P1 ;)

ID: 1361029885133807618

linkhttps://bugcrowd.com/HackerX007 calendar_today14-02-2021 19:10:07

569 Tweet

7,7K Takipçi

363 Takip Edilen

Tuan Anh Nguyen⚡️ 🇻🇳 (@haxor31337) 's Twitter Profile Photo

From SSRF to RCE and transfer money in core banking. It is really cool red team case. A perfect combination of external and internal vulnerabilities for each other to bypass the monitoring and detection of the blue team. Present by my colleague Q5Ca youtu.be/xBnMrNCuO_w?si…

Abdullah Nawaf (HackerX007)🇯🇴 (@xhackerx007) 's Twitter Profile Photo

What’s happening here is really strange! HackerOne is playing judge! A minor disagreement broke out between a few people on X—so why is HackerOne banning them from the platform? Conflicts between bug hunters on Twitter happen all the time, yet H1 has no right to step in and

Abdullah Nawaf (HackerX007)🇯🇴 (@xhackerx007) 's Twitter Profile Photo

This is your chance to be a speaker at PHDays Indonesia — one of the biggest and most exciting conferences! It’s a great opportunity to meet top-tier security researchers from around the world. What are you waiting for?

Mohamed Elkhayat (@mohamed87khayat) 's Twitter Profile Photo

The endpoint was : /storage/users.csv Also try more endpoints like /storage/orders.csv /storage/transactions.csv /storage/reports.csv /storage/customers.csv /storage/backups/users_backup.csv /storage/tables/profiles.csv /storage/tables/roles.csv /storage/tables/invoices.csv

The endpoint was :
 /storage/users.csv

Also try more endpoints like

/storage/orders.csv
/storage/transactions.csv
/storage/reports.csv
/storage/customers.csv
/storage/backups/users_backup.csv
/storage/tables/profiles.csv
/storage/tables/roles.csv
/storage/tables/invoices.csv
X (@themsterdoctor1) 's Twitter Profile Photo

💥 ADVANCED XSLT INJECTION: From Info Disclosure to RCE 🔥 Rare. Powerful. Quiet. This is the kind of injection that silently owns backend XML-based applications. 📚 What Is XSLT Injection? XSLT (Extensible Stylesheet Language Transformations) is used to transform XML

Ashraf Basyoni (@ashrafbasyoni4) 's Twitter Profile Photo

الحمد لله Happy for securing new private program I’m planning to start sharing writeups insha’Allah for the vulnerabilities I find. Here’s a Telegram channel where I’ll be posting soon: t.me/BB0xAshraf

الحمد لله

Happy for securing new private program

I’m planning to start sharing writeups insha’Allah for the vulnerabilities I find.
Here’s a Telegram channel where I’ll be posting soon: t.me/BB0xAshraf
Abdullah Nawaf (HackerX007)🇯🇴 (@xhackerx007) 's Twitter Profile Photo

I look forward to seeing you at Security BSides Ahmedabad 0x6! As always, I promise to deliver my very best, as is my custom. All the topics I will present are based on real-world scenarios I have encountered throughout my career—scenarios that have helped me rank among the top 50

Ashraf Basyoni (@ashrafbasyoni4) 's Twitter Profile Photo

(1/7) Full Organization Takeover Using a Developer Account The Problem: Normally, an API key created by a user with limited permissions (like a Developer) should only be able to do developer-level actions — things like viewing logs, pushing code, or reading team info.

(1/7)

Full Organization Takeover Using a Developer Account

The Problem:

Normally, an API key created by a user with limited permissions (like a Developer) should only be able to do developer-level actions — things like viewing logs, pushing code, or reading team info.
H4x0r.DZ (@h4x0r_dz) 's Twitter Profile Photo

The Israeli forces slaughtered Al Jazeera’s Anas al-Sharif. Those vile bastards! They’ve been gunning for him with threats for ages. Anas was a fearless hero, pouring raw passion and truth into every report. He was our unfiltered lens, and that’s exactly why those cowards

The Israeli forces slaughtered Al Jazeera’s Anas al-Sharif. Those vile bastards! They’ve been gunning for him with threats for ages. Anas was a fearless hero, pouring raw passion and truth into every report. He was our unfiltered lens, and that’s exactly why those cowards
Abdullah Nawaf (HackerX007)🇯🇴 (@xhackerx007) 's Twitter Profile Photo

One of the most critical vulnerabilities I’ve found in my bug bounty career! Critical bugs aren’t as hard as most people think—they’re out there, but they require focus and a bit of patience. At first, I thought I’d accessed data for 80,000 users, but later I discovered it was

One of the most critical vulnerabilities I’ve found in my bug bounty career! Critical bugs aren’t as hard as most people think—they’re out there, but they require focus and a bit of patience.

At first, I thought I’d accessed data for 80,000 users, but later I discovered it was
Abdullah Nawaf (HackerX007)🇯🇴 (@xhackerx007) 's Twitter Profile Photo

I earned $20,000 for my submission on @bugcrowd bugcrowd.com/hackerx007 #ItTakesACrowd Auth bypass into any user account using a backdoor parameter (meant to be for support) , which allows an attacker to log in and bypass auth & 2FA using just the username. It works for both