Ahmed L Shnawy Profile
Ahmed L Shnawy

@AhmedLShnawy2

Followers
18
Following
121
Media
1
Statuses
274

Security Engineer | CRTP | OSCP (in Progress)

Joined April 2020
Don't wanna be here? Send us removal request.
@AhmedLShnawy2
Ahmed L Shnawy
27 days
Just earned the Certified Red Team Professional (CRTP) from Altered Security A 24-hour, hands-on exam compromising modern Active Directory environments using real-world techniques Big thanks to @AlteredSecurity and @nikhil_mitt #CRTP #RedTeam #CyberSecurity #ActiveDirectory
2
2
6
@coffinxp7
Coffin
7 months
Created a private bookmarklet packed with features to extract hidden paths, URLs and endpoints. It fetches data from HTML elements, inline scripts, quoted strings, performance logs and even external JavaScript files for deep reconnaissance.
@intigriti
Intigriti
7 months
6 Quick ways to find hidden query parameters! 😎
11
46
307
@AhmedLShnawy2
Ahmed L Shnawy
9 months
Hackthebox - Netmon Walkthrough https://t.co/6fWuRK5k4U
ahmedlshnawy.medium.com
Nmap:
0
0
1
@coffinxp7
Coffin
1 year
use this payload everywhere.simple but effective '"><svg/onload=prompt(7);>{{7*7}}
4
55
310
@coffinxp7
Coffin
1 year
try this amazing FFUF Oneliner that i use mostly to bypass WAfs and for good & refine results for information disclosure bugs oneliner shared in tg channel: https://t.co/x9BSUPtcYL
7
52
307
@hackinghub_io
HackingHub
4 years
Hey @AhmedLShnawy2, congratulations for finding all the flags on the VulnForum challenge! #ctf #hacking #infosec
0
1
2
@Dinosn
Nicolas Krassas
4 years
How i was able to bypass Cloudflare for XSS!
Tweet card summary image
infosecwriteups.com
In the name of God.
3
76
243
@apisecurityio
APIsecurity.io
4 years
If your API consumes XML, check out this XML Attacks mindmap by @harshbothra_ for the list of potential exploits to be aware of and links to further reading. XMind version: https://t.co/rHxF1t5LLP PDF:
drive.google.com
1
53
117
@tbbhunter
The Bug Bounty Hunter
4 years
How Github recon help me to find NINE FULL SSRF Vulnerability with AWS metadata access https://t.co/P1nJsogj6c
Tweet card summary image
notifybugme.medium.com
Hi, everyone
0
48
153
@KathanP19
Kathan Patel
4 years
Guys check out my latest talk with @trouble1_raunak where he has shown his research in cloud pentesting where he found Illicit Consent Grant Attack on Azure. 🔥 https://t.co/mQoSvSVEIg #cloudpentesting #infosec #bugbounty
0
15
50
@Alra3ees
Emad Shanab - أبو عبد الله
4 years
Subdomains brutforce wordlists collection:- https://t.co/UyA6WuXXg5
github.com
Contribute to emadshanab/Subdomains-brutforce-wordlists-collection development by creating an account on GitHub.
0
67
152
@HolyBugx
HolyBugx
4 years
A collection of my favorite Bug Bounty Resources & Disclosed reports ordered by Vulnerability Types Hopefully useful for both starters and experienced Bug Bounty Hunters Check out my repo: https://t.co/bX2LCAJ8iv #BugBounty #BugBountyTip #BugBountyTips #InfoSec
9
220
537
@Alra3ees
Emad Shanab - أبو عبد الله
6 years
API Security Testing – How to Hack an API and Get Away with It:- Part 1:- https://t.co/mY0benPtHG Part 2:- https://t.co/UG9JSYyvd4 Part 3:- https://t.co/FANcUGVFjI
2
106
247
@SPY8OY
Shreyas
4 years
Xss in asp pages reflected inside span and < blocked. Payloads: %u003Csvg onload=alert(1)> %u3008svg onload=alert(2)> %uFF1Csvg onload=alert(3)> #bugbounty #bugbountytips
7
124
322