Android Security: The Falcon's Guide to Permissions & Attack Surfaces
Understanding the Android attack surface when auditing applications. A comprehensive guide to permissions, components, and security testing...
Hello, I'm Mahmoud Elshorbagy
(falcon0x1).
Pro Tip: Try commands like whoami, skills, or contact
"Every tool is a weapon when you know how to wield it."
Web Application Penetration Tester
CyberTalents / ITI
CyberTalents / ITI
APIsec University
OWASP Top 10, SQL Injection, XSS
Android Security, Frida, MobSF
Nmap, Wireshark, TCP/IP
Bash, Python, Automation
Kerberos, LDAP, BloodHound
Binary Analysis, Debugging
"Building tools that break systems, to make them stronger."
Advanced Bash-based automation tool for reconnaissance. Streamlines subdomain enumeration, port scanning, and vulnerability discovery.
Detailed security research articles covering IDOR, SQL Injection, and Active Directory exploitation techniques.
A tool for analyzing and identifying potentially vulnerable services on a system.
Secure IoT/ICS Automation. Designed localized control system with secure API constraints to prevent unauthorized access.
"Think like an attacker, defend like a guardian."
Information Technology Institute (ITI), Nasr City, Cairo
Faculty of Engineering, Al-Azhar University — Cairo, Egypt
Understanding the Android attack surface when auditing applications. A comprehensive guide to permissions, components, and security testing...
Beyond Activities: exploiting Android Services with automation scripts. A practical guide to finding and exploiting service vulnerabilities...
The art of being a digital detective. From manual enumeration to Python automation for web security testing...
A comprehensive guide to identifying and exploiting Insecure Direct Object Reference vulnerabilities in modern web applications...
Have a project in mind or want to discuss security? Drop me a message!