Strik3r Blog
  • $ whoami
  • Security Research
    • CVEs POCs
      • CVE-2023-37831
      • CVE-2023-37832
      • CVE-2023-37833
      • CVE-2023-37835
      • CVE-2023-39695
      • CVE-2023-36082
      • CVE-2023-36081
      • CVE-2023-34673
      • CVE-2023-34672
      • CVE-2023-34671
      • CVE-2022-44354
      • CVE-2022-44355
      • CVE-2022-44356
      • CVE-2022-48164
      • CVE-2022-48165
      • CVE-2022-48166
      • CVE-2022-44357
    • How To Pass Your eJPT Exam
    • Hacking IoT Introduction
    • Hacking wireless by monitoring
    • The Art of Camouflage: Exploring Advanced PHP Backdoor Obfuscation Techniques
    • Beyond the Desktop: Exploiting a Leaked Token for API
  • Hack The Box
    • Paper
  • CyberTalents Challenges
    • Web Chanllenges
      • Private Agent
    • Intro to Cybersecurity Bootcamp CTF Assessment
  • Bug Bounty
    • Easy LFI
    • HTTP PUT Method Exploit
Powered by GitBook
On this page

Was this helpful?

$ whoami

NextCVEs POCs

Last updated 8 months ago

Was this helpful?

Eslam Kamal

33xCVE | CARTP | eWPTX | eCPPT | eJPT

Analytical Penetration Tester with over 3 years of hands-on experience in various domains such as Web, Network, Cloud, and IoT pentesting. Strong knowledge of network architectures, operating systems, and cybersecurity tools. Confident and communicative professional proficient in scripting paired with familiarity with Unix and Windows. A collaborative team player committed to working with businesses and organizations to identify and resolve security vulnerabilities and weaknesses affecting digital assets and computer networks.

Acknowledged by:

  • IBM

  • Costco

  • Mondelēz International

And many other companies around the world for finding security vulnerabilities with different severities in their systems.

Social Links

Lenovo
Nvidia
Dutch Judiciary
Deutsche Telekom
Drexel University
Solaredge
University of Cambridge
APNIC
Facebook
Linkedin
Twitter
Github