l0cpd Profile Banner
l0cpd Profile
l0cpd

@l0cpd

Followers
1K
Following
2K
Media
103
Statuses
892

| Father | Bug Bounty Hunter | RECON | MMA |

Joined September 2018
Don't wanna be here? Send us removal request.
@l0cpd
l0cpd
8 days
0
0
0
@Bugcrowd
bugcrowd
7 months
A lot of hackers fail because they only look for bugs, not systems. If you want to find vulnerabilities others miss, you need to model how the application works first. Here are 5 ways to do it right 👇 1️⃣ Identify valuable target data Start by asking: what data does the
1
21
87
@l0cpd
l0cpd
7 months
“Full-Blown SSRF to Gain Access to Millions of Users’ Records and Multiple Internal Panels” by Skyer https://t.co/ridKB8NW91
0
0
5
@coffinxp7
Coffin
7 months
I've included all the proven 403 bypass techniques that consistently work in real-world scenarios. After reading this write-up you won't need to refer to any other article or video on the topic anymore..i will update more things in it soon.. https://t.co/GFqZb3Hu5b
infosecwriteups.com
Master the art of 403 bypass with hands-on examples, tools and tips..
17
156
666
@l0cpd
l0cpd
8 months
“Escalating Impact: Full Account Takeover in Microsoft via XSS in Login Flow” by Asem Eleraky https://t.co/vt13dJJlT4
0
3
16
@spaceraccoonsec
spaceraccoon | Eugene Lim
10 months
Writing a technical book is only a small fraction of the work. You still need: 1. Technical review 2. General editing 3. Copy editing 4. Cover designing 5. Proof reading <— I am here “From Day Zero to Zero Day” is a way better book thanks to the amazing team at @nostarch and I
16
117
899
@xnl_h4ck3r
/ XNL -н4cĸ3r (and @xnl-h4ck3r in the new Sky)
10 months
It's been on my TODO list for soooooooo long, but finally got my self-hosted interactsh server sorted, with file hosting. Thanks @pdiscoveryio for the great tools! 🤘 And also a nice Burp extension https://t.co/Qc3Mcf0AME which will be useful
1
3
54
@0xw2w
Max Yaremchuk
10 months
Here’s my new blog post: “Redacted bugs #3: Hunting for bugs worth $7,750 in an adult content platform.” Happy reading!
Tweet card summary image
securityrise.com
A security research describing 6 subscription-based adult content app-related vulnerabilities resulted in a $7,750 total bounty.
4
26
124
@l0cpd
l0cpd
10 months
Leaking the email of any YouTube user for $10,000
0
0
2
@l0cpd
l0cpd
10 months
“A Journey of Limited Path Traversal To RCE With $40,000 Bounty!” by HX007 https://t.co/QTZcVxmyE1
0
0
0
@Bugcrowd
bugcrowd
10 months
🖐 ways to test for broken access control!
5
15
124
@l0cpd
l0cpd
11 months
How I Hacked a User Management System and Found 3 Critical GraphQL Vulnerabilities | by 4bd0_m4g3d | Jan, 2025 | Medium
Tweet card summary image
0x4bdo.medium.com
Hi, I’m Abdo Maged, a bug hunter with 7 months of experience in identifying and reporting security vulnerabilities.
0
1
14
@zhero___
zhero;
1 year
happy to release my new article entitled: Next.js and cache poisoning: a quest for the black hole https://t.co/v7aqiYJjyX good reading;
38
184
781
@zhero___
zhero;
11 months
very pleased to announce the release of my new article based on my research that led to CVE-2024-46982 titled: Next.js, cache, and chains: the stale elixir https://t.co/UFndJxNYLI note: does not cover the latest findings shared in my recent posts enjoy reading;
45
242
998
@l0cpd
l0cpd
1 year
User/Pass, service name,... exposed on github Download service -> Decomplier -> find endpoints -> access data #BugBounty #bugbountytips
2
1
64
@l0cpd
l0cpd
1 year
Modify 302 Found --> 200 Ok #BugBounty #bugcrowd
2
3
123
@l0cpd
l0cpd
1 year
Program Manager’s Guide To Running a Successful Bug Bounty Program https://t.co/f60KmQHhTP
Tweet card summary image
blog.criticalthinkingpodcast.io
How to run a bug bounty program hackers will love to hack on.
0
0
0