Bug Bounty Programs List
Company Name | Verified domains |
Reports Total/Fixed/Unfixed |
---|
Company Name | Verified domains |
Reports Total/Fixed/Unfixed |
---|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
25.12.2020 by _Y000_ How to bypass mod_security (WAF) |
10.12.2020 by _Y000_ sql injection to bypass Mod_Security |
10.12.2020 by _Y000_ Create encoded sql payloads |
26.10.2020 by _r00t1ng_ Bypass Addslashes using Multibyte Character |
Rajesh was very helpful in providing information and penetration testing on our site. With this information, we were able to harden our infrastructure. |
Hi Praveen, Thanks for the help with the vulnerability. Very fast and friendly contact. |
We had no idea that this vulnerability existed in many PHP-based websites and you kindly reported it to us. Thanks for your help and all the best for your career! |
Thank you very much for informing us about our access vulnerability! The world needs more good guys like you! A+! |
Specialist in web application penetration tester, student and passionate about computer security and ethical hacking. |