Ahmed Fahim (Elliot)DOM XSS Vulnerabilities: PortSwigger Labs Walkthrough (Part 1)Learn Dom XSS with Portswigger Labs solution from this step-by-step guide. Perfect for beginners and professionals seeking to master the…Oct 3Oct 3
Ahmed Fahim (Elliot)Dogcat Walkthrough - THMWe take you on an interesting tour and solve the dogcat challenge from tryhackme. We will learn about LFI and how to privilege escalated…Jul 18, 2023Jul 18, 2023
Ahmed Fahim (Elliot)Cybertalents ctf: String highlighterWe will learn how to do Code Injection, access the server content, and execute commands on itJun 25, 2023Jun 25, 2023
Ahmed Fahim (Elliot)CyberTalents: who is admin challengelink arabic version : https://root-x.dev/blog/article/who-is-admin-walkthroughJun 21, 2023Jun 21, 2023
Ahmed Fahim (Elliot)SQL Injection AttacksSQL injection is a type of security vulnerability that occurs when untrusted user input is not properly validated or sanitizedMar 25, 2023Mar 25, 2023
Ahmed Fahim (Elliot)What are Cryptographic and Encryption Algorithms and Examples of Programsis the practice of securing information by converting it into an unreadable format.Mar 11, 2023Mar 11, 2023
Ahmed Fahim (Elliot)Cross site request forgery (CSRF) attackCSRF is a type of vulnerability that allows an attacker to perform unwanted actions on a website on behalf of an authenticated userMar 9, 2023Mar 9, 2023
Ahmed Fahim (Elliot)What is the Open Redirect vulnerability, find it, and protect against itللإطلاع علي النسخة العربيةMar 5, 2023Mar 5, 2023