Hello, I’m Mohamed Mahmoudi.
I like finding smart ways to convince computers to do what I want !
I’m a passionate security researcher with extensive experience in penetration testing, bug bounty hunting, and web development.
Web Developer
As a freelance web developer, I build dynamic, secure websites using HTML, CSS, PHP, Node.js, and React. From portfolios to e-commerce platforms, I focus on creating user-friendly, scalable, and high-performance solutions tailored to my clients’ needs.
Penetration Tester
With experience in 100+ penetration tests, I have led and conducted security assessments focusing on web and cloud infrastructures. My expertise lies in uncovering vulnerabilities, providing actionable insights, and helping organizations strengthen their security postures.
Security Researcher
As an active contributor in the Bug Bounty community, I’ve submitted vulnerabilities to multiple high-profile companies. My research focuses on esoteric attack vectors, supply chain attacks, and large-scale testing, pushing the boundaries of cybersecurity.
Companies I have worked with
I have identified and reported valid security issues to the following bug bounty programs:
In this article, I detail the discovery of a critical web cache poisoning vulnerability in websites hosted on Hubspot CMS, which had the potential for widespread watering hole attacks. By exploiting how media files were cached and served, I demonstrated how attackers could replace legitimate content with malicious files, affecting over 100,000 websites. The vulnerability was responsibly disclosed to Hubspot and subsequently patched. This research highlights the importance of understanding web cache behavior and exploiting secondary contexts in web applications.
In this write-up, I share how I was able to chain a Blind XSS on the admin side with a CSRF vulnerability to achieve code injection, allowing for full control over a website's content. By exploiting a suggest edits feature on a documentation platform, I bypassed filters, triggered XSS, and escalated the attack to gain administrative privileges, leading to potential site defacement and more. After responsibly reporting the issue, the vulnerability was patched, and a bounty was awarded.
In this write-up, I describe how I discovered and exploited a flaw in the OAuth implementation of a company's staging and production environments. By manipulating the 'referer' parameter in OAuth requests, I successfully logged into a victim’s account using an attacker session. This exploit was made possible due to the reuse of JWT secrets across environments and the lack of email confirmation requirements. The vulnerability highlights the risks of staging environments and the importance of proper authentication and session management.
In this report, I detail a critical CSRF vulnerability in Hackerone’s Tray.io integration, which enables organizations to connect their bug bounty programs with third-party apps like Github and Jira. By exploiting a lack of CSRF protection, I demonstrated how an attacker could trick users into linking their third-party apps to the attacker’s Hackerone account. Additionally, the integration’s GraphQL API could be leveraged post-exploitation to perform unauthorized actions, such as accessing private Github repositories. Despite the severity, the bounty was reduced to 20% because of a non heard of policy about third party related vulnerabilities.
In this article, I reveal a misrouting vulnerability that I uncovered while diving into Google Cloud Load Balancers connected to storage buckets—something that exposed thousands of websites to potential attacks. By crafting unconventional HTTP requests, I stumbled upon a flaw that reveals sensitive bucket names and opens the door for attackers to exploit load balancers in unexpected ways. Ever wonder how much damage can be done through a misconfigured cloud setup? Think data leakage, resource exhaustion, and sneaky redirections. Curious about how I pulled it off and the risks you might be overlooking? Read on to find out.
Skills
My Bug Bounty profiles:
Get in touch
Whether you want to collaborate, hack together or simply discuss geeky subject, feel free to drop me a message