Muhanad IsraiwiExported Activity In Android Application Allowing Access to Payments InformationHi Everyone, My name is Muhanad Israiwi. I’m a Bug Bounty Hunter and Penetration Testing professional.May 30May 30
Muhanad IsraiwiSetting Up an Active Directory Lab for Pentesting: Part 1Hi Everyone, My name is Muhanad Israiwi. I’m a Bug Bounty Hunter and Penetration Testing professional.May 20May 20
Muhanad IsraiwiExposed Key In Page Source Led To Bypass CaptchaHi Everyone, My name is Muhanad Israiwi. I’m a Bug Bounty Hunter and Penetration Testing professional.May 83May 83
Muhanad IsraiwiExploiting PUT Method Led TO Remote Code Execution (RCE) on SamsungHi Everyone, My name is Muhanad Israiwi. I’m a Bug Bounty Hunter and Penetration Testing professional.Apr 242Apr 242
Muhanad IsraiwiFull Guide To Network Penetration Testing and Network Penetration MethodologyHi Everyone, My name is Muhanad Israiwi. I’m a Bug Bounty Hunter and Penetration Testing professional.Mar 183Mar 183
Muhanad IsraiwiBypass Panel via API Fuzzing Led To Access to All Users InformationHi Everyone,My name is Muhanad Israiwi. I’m a Bug Bounty Hunter and Penetration Testing professional.Mar 174Mar 174
Muhanad IsraiwiFirewall Evasion Techniques Using NmapMy name is Muhanad Israiwi, and I’m a Penetration Testing professional. Today, I’d like to introduce you to Nmap, a powerful tool in the…Mar 5Mar 5
Muhanad IsraiwiFrom Error_Log File(P4) To Company Account Takeover(P1) and Unauthorized Actions On APIHi Everyone,My name is Muhanad Israiwi. I’m Bug Bounty Hunter, I'm Student At Amman Arab University.Jan 17, 20232Jan 17, 20232
Muhanad IsraiwiI Found Information Exposed In GitHub,What Next?Hi Everyone,My name is Muhanad Israiwi. I’m Bug Bounty Hunter,Software Engineering Student At Amman Arab University.Jan 15, 2023Jan 15, 2023