syteem@pentester : ~ $ whoami
MUHAMMED ASHML

Muhammed
Ashml

Web Application Penetration Tester

└─
$ cat recognition.txt

Recognized by NASA for reporting High-Severity vulnerability in their live production system

Security Research Aesthetic
cat impact.txt

Major Organizations Impacted by My Web Penetration Testing & Research

Intel NASA Atlassian Twilio Maastricht University INTERCOM IVANTI pagerduty
ABOUT

Muhammed_Ashml

Muhammed Ashml , Web Security Penetration Tester and Security researcher recognized for the identification of security vulnerabilities across diverse digital infrastructures.

The research has led to the strengthening of security postures for high-profile organizations, including NASA, Intel, Atlassian, and Oxford University. This impact extends to globally utilized platforms such as Twilio, Intercom, Maastricht University, Ivanti, and PagerDuty, etc....

Technical proficiency is anchored in a solid understanding of Web Technologies and Programming, coupled with comprehensive hands-on experience in Linux systems and shell command execution.

Execution_Parameters

01 // WEB_ARCHITECTURE_ANALYSIS

Deconstructing application workflows to identify entry points and hidden attack surfaces.

02 // LOGIC_FLAW_EXPLOITATION

Discovering and validating business logic bypasses that circumvent standard security controls.

03 // APPLICATION_LAYER_HARDENING

Providing high-impact research to remediate critical vulnerabilities in production web environments.

My Research & Findings

Report #001

Blind SSRF

From Pingback to Penetration: Uncovering high-severity Blind SSRF in production environments.

Read Advisory
Exploit #002

Remote Code Execution

Researching Remote Code Execution (RCE) via PHP Configuration Injection techniques.

Read Advisory
Logic #003

OAuth Workflow

Analysis of flawed OAuth onboarding processes causing permanent account denial of service.

Read Advisory