Security
Two Captcha Bypasses — …
This is my first write-up here. I will talk about how I bypassed captcha on two companies.
First One (Captcha Token Reuse)
While testing a site.example.com, I found that signing up on their site had a captcha. I solved the captcha challenge and captured the request with credentials, and I saw the …
Evade Network Scanners …
We all know the most common network scanner NMAP. The mechanism that all network scanners work with is testing kernel network transport layer protocol response [ICMP / TCP / UDP / SCTP] across the whole 65,000 ports.
Now, how do scanners know if a port is open / closed / filtered? If you don’t …
Computer Security & …
Hey! I am an Egyptian computer security researcher and I wanted to share knowledge about binary hacking for you all.
Facebook: https://www.facebook.com/mahmoudadel0x
Let’s start. I will talk about three topics for now, and in the next session I will continue:
- Computer memory and virtual …


