# whoami

Hello there my name is Mohammed Ahmed (CANITEY), I'm a noob bughunter, and a programmer.

### Skills under my belt

* Web applications penetration testing
* Android application penetration testing
* HTML/CSS, JS, PHP, Go, Python programming, and welling to learn whatever interesting language gets on the radar XD

### In progress

* Network penetration testing
* Active directory testing

## Highlights

{% content-ref url="/pages/6NaebUzx8QDUfTOHqvlP" %}
[CVE-2025-4957 Walkthrough](/canitey/cve-walktroughs-exploits/cve-2025-4957-walkthrough.md)
{% endcontent-ref %}

## Experiences

* Bughunter, found several bug can find some of them written [here](https://canitey.medium.com)
  * [UUID based IDOR leaking PIIs](https://canitey.medium.com/idor-uuids-to-leak-pii-7675130ab784)
  * [CSRF and Broken business logic lead to taking down whole organization](https://canitey.medium.com/one-click-to-collapse-chaining-logic-flaw-csrf-to-take-down-a-saas-organization-7d58736fc6f9)
  * [Forced Browsing lead to mass PII leakage](https://canitey.medium.com/one-click-to-collapse-chaining-logic-flaw-csrf-to-take-down-a-saas-organization-7d58736fc6f9)

## CVEs (by me)

* [CVE-2025-4957](https://www.cve.org/CVERecord?id=CVE-2025-4957), [Technical walkthrough](/canitey/cve-walktroughs-exploits/cve-2025-4957-walkthrough.md)

## Projects

* [Wrote Exploits/Walkthroughs for CVEs](https://github.com/CANITEY/CVEs-and-Exploits)
  * &#x20;[CVE-2025-6977 - Profilegrid Reflected XSS walktrough](https://github.com/CANITEY/CVEs-and-Exploits/tree/main/CVE-2025-6977-POC)

## Contact me @

* [Facebook](https://web.facebook.com/mohamed.med01345/)
* [Linkedin](https://www.linkedin.com/in/mohammed-ahmed-%F0%9F%87%B5%F0%9F%87%B8-919705187)
* [Medium](https://medium.com/@CANITEY), I publish bug bounty writeups here ;)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://canitey.gitbook.io/canitey/index/whoami.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
