Start Bug Bounty Program in 5 Easy Steps. It's Free!
In order to create Bug Bounty program via Open Bug Bounty you should login via your Twitter Account first
Infosec Institute
Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute
The Hacker News
Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News
Start Bug Bounty Program in 5 Easy Steps. It's Free!
In order to create Bug Bounty program via Open Bug Bounty you should login via your Twitter Account first
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
16.01.2023 by itsvarmakollu Turning cookie-based XSS into account takeover |
08.07.2022 by kh4sh3i_ Zabbix - SAML SSO Authentication Bypass |
08.07.2022 by FR13ND0x7F The Time Machine — Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not |
He's a reliable partner in finding and fixing some security issues on our website, and I'm happy to recommend working with him. Thanks for the collaboration! |
On behalf of LeaseQuery, I wish to extend our gratitude to 4N_CURZE for reporting a vulnerability found on our website. 4N_CURZE was quick to respond and gladly provided all the information he could in order to help mitigate the risk. His efforts to make the internet a safer place is greatly appreciated! |
Huge thanks to Rajesh for pointing out an XSS vulnerability that affected several pages in the website I am developing on my free time. It is much appreciated and the report was very clear! |