Ahmad HalabiThe ART of Chaining VulnerabilitiesDeep Dive into breaking applications and chaining vulnerabilities to hack complete infrastructures.Dec 23, 20233Dec 23, 20233
Ahmad HalabiFrom Revealing Emails to Taking Over Accounts (Hacking Telecom)Hacking Telecom — Revealing user’s emails then taking over their accounts.Aug 12, 20234Aug 12, 20234
Ahmad HalabiPII Disclosure of Apple Users ($10k)How I hacked Apple and was able to Disclose Apple Users Private Shipping Information and Mobile Numbers.Jul 7, 202213Jul 7, 202213
Ahmad HalabiUltimate Reconnaissance RoadMap for Bug Bounty Hunters & PentestersAdvanced Reconnaissance and Web Application Discovery RoadMap to Find Massive Vulnerabilities.Dec 22, 202114Dec 22, 202114
Ahmad HalabiTaking Over Employee Accounts by Managers with Zero Employee InteractionHello,Aug 13, 2021Aug 13, 2021
Ahmad HalabiMy Experience For 2 Years In Bug Bounty HuntingMy experience and achievements that were gathered during Bug Bounty Hunting that I started 2 years ago.Jun 26, 20217Jun 26, 20217
Ahmad HalabiinInfoSec Write-upsRCE via Internal Access to Adminer Database Management (Critical)How I was able to access an internal Database Management leading to Remote Code Execution.Apr 24, 20213Apr 24, 20213
Ahmad HalabiFinding Hidden Login Endpoint Exposing Secret `Client ID`From Low to High Severity Vulnerability. Finding Hidden Login Endpoint Exposing Secret `Client ID`.Mar 7, 20215Mar 7, 20215
Ahmad HalabiSecret Key Exposure in API Config DirectorySecret Key Exposure - High SeverityFeb 28, 20212Feb 28, 20212
Ahmad HalabiChaining Multiple Requests to Achieve Rate Limiting VulnerabilitiesHello,Nov 29, 20203Nov 29, 20203