Ahmad HalabiThe ART of Chaining VulnerabilitiesDeep Dive into breaking applications and chaining vulnerabilities to hack complete infrastructures.8 min read·Dec 23, 2023--3--3
Ahmad HalabiFrom Revealing Emails to Taking Over Accounts (Hacking Telecom)Hacking Telecom — Revealing user’s emails then taking over their accounts.4 min read·Aug 12, 2023--4--4
Ahmad HalabiPII Disclosure of Apple Users ($10k)How I hacked Apple and was able to Disclose Apple Users Private Shipping Information and Mobile Numbers.7 min read·Jul 7, 2022--11--11
Ahmad HalabiUltimate Reconnaissance RoadMap for Bug Bounty Hunters & PentestersAdvanced Reconnaissance and Web Application Discovery RoadMap to Find Massive Vulnerabilities.7 min read·Dec 22, 2021--13--13
Ahmad HalabiTaking Over Employee Accounts by Managers with Zero Employee InteractionHello,7 min read·Aug 13, 2021----
Ahmad HalabiMy Experience For 2 Years In Bug Bounty HuntingMy experience and achievements that were gathered during Bug Bounty Hunting that I started 2 years ago.6 min read·Jun 26, 2021--7--7
Ahmad HalabiinInfoSec Write-upsRCE via Internal Access to Adminer Database Management (Critical)How I was able to access an internal Database Management leading to Remote Code Execution.4 min read·Apr 24, 2021--3--3
Ahmad HalabiFinding Hidden Login Endpoint Exposing Secret `Client ID`From Low to High Severity Vulnerability. Finding Hidden Login Endpoint Exposing Secret `Client ID`.4 min read·Mar 7, 2021--4--4
Ahmad HalabiSecret Key Exposure in API Config DirectorySecret Key Exposure - High Severity3 min read·Feb 28, 2021--2--2
Ahmad HalabiChaining Multiple Requests to Achieve Rate Limiting VulnerabilitiesHello,4 min read·Nov 29, 2020--3--3