Mohamed Mahmoudi
Mohamed Mahmoudi
Mohamed Mahmoudi
Mohamed Mahmoudi

Mohamed Mahmoudi

Hello, I’m Mohamed Mahmoudi.

I like finding smart ways to convince computers to do what I want !

I’m a passionate security researcher with extensive experience in penetration testing, bug bounty hunting, and web development.

Web Developer

As a freelance web developer, I build dynamic, secure websites using HTML, CSS, PHP, Node.js, and React. From portfolios to e-commerce platforms, I focus on creating user-friendly, scalable, and high-performance solutions tailored to my clients’ needs.

Penetration Tester

With experience in 100+ penetration tests, I have led and conducted security assessments focusing on web and cloud infrastructures. My expertise lies in uncovering vulnerabilities, providing actionable insights, and helping organizations strengthen their security postures.

Security Researcher

As an active contributor in the Bug Bounty community, I’ve submitted vulnerabilities to multiple high-profile companies. My research focuses on esoteric attack vectors, supply chain attacks, and large-scale testing, pushing the boundaries of cybersecurity.

Companies I have worked with

I have identified and reported valid security issues to the following bug bounty programs:

image
image
image
image
image
image
image
image

Case studies

Saving over 100,000 websites from a Watering Hole attack
Saving over 100,000 websites from a Watering Hole attack
writeup

In this article, I detail the discovery of a critical web cache poisoning vulnerability in websites hosted on Hubspot CMS, which had the potential for widespread watering hole attacks. By exploiting how media files were cached and served, I demonstrated how attackers could replace legitimate content with malicious files, affecting over 100,000 websites. The vulnerability was responsibly disclosed to Hubspot and subsequently patched. This research highlights the importance of understanding web cache behavior and exploiting secondary contexts in web applications.

A 0 day vulnerability chain on a widely used documentation CMS
A 0 day vulnerability chain on a widely used documentation CMS
writeup

In this write-up, I share how I was able to chain a Blind XSS on the admin side with a CSRF vulnerability to achieve code injection, allowing for full control over a website's content. By exploiting a suggest edits feature on a documentation platform, I bypassed filters, triggered XSS, and escalated the attack to gain administrative privileges, leading to potential site defacement and more. After responsibly reporting the issue, the vulnerability was patched, and a bounty was awarded.

From staging to 0 click account takeover
From staging to 0 click account takeover
writeup

In this write-up, I describe how I discovered and exploited a flaw in the OAuth implementation of a company's staging and production environments. By manipulating the 'referer' parameter in OAuth requests, I successfully logged into a victim’s account using an attacker session. This exploit was made possible due to the reuse of JWT secrets across environments and the lack of email confirmation requirements. The vulnerability highlights the risks of staging environments and the importance of proper authentication and session management.

How I have obtained Hack the Hackers badge on Hackerone
How I have obtained Hack the Hackers badge on Hackerone
writeup

In this report, I detail a critical CSRF vulnerability in Hackerone’s Tray.io integration, which enables organizations to connect their bug bounty programs with third-party apps like Github and Jira. By exploiting a lack of CSRF protection, I demonstrated how an attacker could trick users into linking their third-party apps to the attacker’s Hackerone account. Additionally, the integration’s GraphQL API could be leveraged post-exploitation to perform unauthorized actions, such as accessing private Github repositories. Despite the severity, the bounty was reduced to 20% because of a non heard of policy about third party related vulnerabilities.

How I found a P2 Misrouting issue affecting all Google Cloud Load Balancers
How I found a P2 Misrouting issue affecting all Google Cloud Load Balancers
writeup

In this article, I reveal a misrouting vulnerability that I uncovered while diving into Google Cloud Load Balancers connected to storage buckets—something that exposed thousands of websites to potential attacks. By crafting unconventional HTTP requests, I stumbled upon a flaw that reveals sensitive bucket names and opens the door for attackers to exploit load balancers in unexpected ways. Ever wonder how much damage can be done through a misconfigured cloud setup? Think data leakage, resource exhaustion, and sneaky redirections. Curious about how I pulled it off and the risks you might be overlooking? Read on to find out.

Skills

Software

3 views

Software

Expertise

Language

Burp Suite
Burp Suite
Nuclei
Nuclei
Gophish
Gophish
Axiom
Axiom
Metasploit
Metasploit
Nessus
Nessus
Nmap
Nmap
EvilGinx
EvilGinx
Bash
Bash
Python
Python
Golang
Golang
React
React
Nodejs
Nodejs
HTML & CSS
HTML & CSS
Javascript
Javascript
Prestashop
Prestashop
Wordpress
Wordpress
Google Cloud Run
Google Cloud Run
AWS Lambda
AWS Lambda
SQL
SQL
MongoDB
MongoDB

My Bug Bounty profiles:

MedMahmoudi on Bugcrowd

View MedMahmoudi’s researcher profile on Bugcrowd, a platform and team of experts connecting organizations to a global crowd of trusted security researchers.

bugcrowd.com

MedMahmoudi on Bugcrowd
Mohamed Mahmoudi | Google Bug Hunters

See our rankings to find out who our most successful bug hunters are.

bughunters.google.com

Mohamed Mahmoudi | Google Bug Hunters
HackerOne profile - medmahmoudi

Full time hacker with background in web development and pentesting - https://med-mahmoudi26.medium.com/

hackerone.com

HackerOne profile - medmahmoudi

Get in touch

Whether you want to collaborate, hack together or simply discuss geeky subject, feel free to drop me a message