Lazy_Hackerᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠ

241 posts

Lazy_Hackerᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠ banner
Lazy_Hackerᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠ

Lazy_Hackerᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠ

@lazy_hack3r

Bug Bounty Hunter

127.0.0.1 เข้าร่วม Ekim 2020
310 กำลังติดตาม183 ผู้ติดตาม
Lazy_Hackerᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠ รีทวีตแล้ว
Aituglo - Cassim
Aituglo - Cassim@aituglo·
I've been doing bug bounty for years. I just published a long piece on what it actually feels like in 2026, and why something fundamental has shifted. aituglo.com/state-of-bug-b… Would love to get your feedback on it here on X or directly on the blog
English
8
53
307
24.5K
Lazy_Hackerᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠ รีทวีตแล้ว
The XSS Rat - Proud XSS N00b :-)
From 0 to Bug Bounty Hunter in 12 months: thexssrat.podia.com/big-beautiful-… Month 1–2: Learn the basics: networking, HTTP/HTTPS, DNS, cookies, Linux, command line, and how the web works. Month 3–4: Study web security fundamentals: XSS, SQLi, IDOR, CSRF, auth flaws, SSRF, file upload bugs, access control issues. Month 5–6: Practice in labs every day. Use legal training platforms, solve writeups, and repeat the same bug classes until you truly understand them. Month 7–8: Learn reconnaissance: subdomain discovery, content discovery, parameter hunting, JS file analysis, screenshots, note taking, and organizing targets. Month 9–10: Start hunting on real programs. Pick beginner-friendly public targets, stay within scope, read policies carefully, and focus on simple high-signal bugs first. Month 11: Improve reporting. A good report needs: clear title, steps to reproduce, impact, proof, and a clean fix suggestion. Month 12: Review everything. Track misses, re-test old targets, specialize in 2–3 bug classes, and build your own workflow. Daily routine: 1 hour learning 1 hour labs 1 hour recon or live testing 1 hour reading reports/writeups Rules: * Be consistent * Take notes * Go deep, not wide * Most people quit too early Goal for year 1: Not “get rich fast.” Goal = become dangerous with fundamentals, find valid bugs, and build a repeatable process. 1 focused year can change everything.
English
3
44
319
13.9K
Lazy_Hackerᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠ รีทวีตแล้ว
Jerry
Jerry@Mdhsan19·
If you ever encounter a internal salesforce instance which is restricted for external user and allowed /sfsites/aura just change the endpoint to aura and use random descriptor without wrong aura token will leads to internal configuration file leakage #bugbountytips #bugbounty
English
0
4
72
3.1K
Lazy_Hackerᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠ รีทวีตแล้ว
Jenish Sojitra
Jenish Sojitra@_jensec·
Biggest disadvantage of bug bounty is that your output (income) is tied directly to input(number of hours)
English
13
9
210
11.9K
Lazy_Hackerᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠ รีทวีตแล้ว
Subhash | Cybersecurity
Subhash | Cybersecurity@subhashkumar·
Exam Voucher Giveaway Prize: CEH How to enter: - Follow me - Retweet this post - Comment a message what you are learning right now Picking a winner in 30 days. Good luck! (Please make sure your DMs are open)
Subhash | Cybersecurity tweet media
English
5
3
2
184
Behi
Behi@Behi_Sec·
What was the first bug you got paid for? My first bounty was $100 for a Path Disclosure 😅
English
36
1
76
8K
Arshad Kazmi
Arshad Kazmi@arshadkazmi42·
I don’t know who needs to hear this, but your .env file should not be public. #iScanToday
English
2
1
18
1.2K
Lazy_Hackerᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠ รีทวีตแล้ว
Ben Sadeghipour
Ben Sadeghipour@NahamSec·
🚨 Doing a giveaway for my Blind XSS Masterclass Most people think they know XSS, until they meet blind XSS, the kind that fires where you’ll never see it. Same methods that helped me earn $250K+ from real reports. hhub.io/nahamsecbxss 🎁 Retweet and reply to enter.
Ben Sadeghipour tweet media
English
391
377
724
76.8K
YesWeHack ⠵
YesWeHack ⠵@yeswehack·
Last-minute costume idea: hacker at @YesWeHack 🕷️💻 Don't have what you need? Try your luck to win a swag pack! To enter: 👉 Follow us 👉 Comment your fav Halloween emojis Winners (one here, one on LinkedIn) will be announced Monday, 11AM CET. Good luck, spooky hackers! 💀
YesWeHack ⠵ tweet media
English
239
22
275
36.4K
Lazy_Hackerᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠ รีทวีตแล้ว
Rohit
Rohit@rohsec·
🚨 GIVEAWAY ALERT !! 🚨 Giving away hacker swags from the shop 👀 How to enter: Like & Retweet the original post ❤️ Follow @bughuntershop 2 Winners gets customized hacker goodies from the shop cc: @bug_vs_me @errorsec_ @tabaahi_ @hetmehtaa @3ncryptSaan @krishnsec #bugbounty
Rohit@rohsec

🚨 ALERT !! 🚨 The all new @bughuntershop is now live 😀 A small store for hackers and creators bughunter.shop Custom 3D printed hacker wall arts, lightboxes & keychains - all made for your setup⚡️ Built by a hacker, for hackers #bugbounty

English
0
10
15
3.1K
Lazy_Hackerᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠ รีทวีตแล้ว
Rohit
Rohit@rohsec·
🚨 ALERT !! 🚨 The all new @bughuntershop is now live 😀 A small store for hackers and creators bughunter.shop Custom 3D printed hacker wall arts, lightboxes & keychains - all made for your setup⚡️ Built by a hacker, for hackers #bugbounty
Rohit tweet mediaRohit tweet mediaRohit tweet mediaRohit tweet media
English
0
9
13
5K
Lazy_Hackerᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠ รีทวีตแล้ว
🇸🇦 Murtada Bin Abdullah (Rood)
many people asked me what's my wordlist i posted 3 times before now this is last tweet about it general wordlist: raw.githubusercontent.com/maurosoria/dir… for PHP: wordlists-cdn.assetnote.io/data/automated… for asp, aspx: wordlists-cdn.assetnote.io/data/automated… for java applictions: wordlists-cdn.assetnote.io/data/automated… #bugbountytips
English
33
303
738
52.9K