Dipu1A | Security Researcher Profile
Security researcher Dipu1A has already helped fix 735 vulnerabilities.
Researcher reputation: 180
Real name:
Md. Nur A Alam Dipu
About me:
Bug hunter and sql injector.
https://hackerone.com/dipuhasan
https://bugcrowd.com/nuraalamdipu
How to contact me:
[email protected]
https://twitter.com/Dipu1A
Alternative Contacts:
[email protected]
Experience in Application Security
1-3 years
Award / Bug Bounty I prefer:
btc,paypal,bank, payoneer
Paypal : Contact via email
Halls of Fame:
Yahoo,Dell,oracle,intel,eset,sony etc
Recommendations and Acknowledgements


I run a team that is very security conscious, but even so things sometimes slip by. Dipu’s attention helped us identify and fix a vulnerability we should have caught. His attention to things like this is most valuable and appreciated. |


Dear Dipu1A, The University of Vienna would like to thank you for your valuable contribution in finding multiple website security issues. Your input is highly welcome and helps to raise the security level of our educational institution. Servus and greetings from Vienna, Austria. |


Quick and accurate communication. Wonderful to work with. |


Thanks Dipu1A... I had no idea how easy it was to have a XSS vulnerability. Much thanks for pointing it out. |


I\'d like to offer much thanks to Dipu1A for helping to identify an xss bug in the university\'s website. He provided info to me about the vulnerability as well as how to prevent it in the future. |


Contacted me regarding a couple of weaknesses on MedWorm that he found, that I fixed and he then tested. Much appreciated! |


We got a self initiated message from Dipu1A on the contact form of our website. Asking for details we were provided very quick advice indicating the vulnerability and what to do. That helped us very efficiently to fix the issue. Thanks a lot for all! |


Thanks Dipu1A for helping us improve the security of our website. |
Shows the first 10 recommendations. See all.
Honor Badges
Number of Secured Websites
![]() |
![]() |
![]() |
![]() |
10+ Websites
|
50+ Websites
|
500+ Websites
|
WEB SECURITY VETERAN
1000+ Websites
|
Advanced Security Research
![]() |
![]() |
![]() |
![]() |
WAF Bypasser
|
CSRF Master
30+ Reports
|
AppSec Logic Master
30+ Reports
|
Fastest Fix
Fix in 24 hours
|
Outstanding Achievements
![]() |
![]() |
![]() |
|
Secured OBB
|
OBB Advocate
|
Improved OBB
|
Commitment to Remediate and Patch
![]() |
![]() |
![]() |
|
Patch Master
55% Patched
|
Patch Guru
65% Patched
|
Patch Lord
75% Patched
|
Recommendations and Recognition
![]() |
![]() |
![]() |
|
REPUTABLE
10+ Recommends
|
FAMOUS
25+ Recommends
|
GLOBALLY TRUSTED
50+ Recommends
|
Distinguished Blog Author
![]() |
![]() |
![]() |
|
1 Post
|
3 Posts
|
5+ Posts
|
Research Statistics
Total reports: | 4312 |
Total reports on VIP sites: | 84 |
Total patched vulnerabilities: | 735 |
Total vulnerabilities on Hold (Open Bug Bounty): | 596 |
Recommendations received: | 12 |
Active since: | 24.03.2018 |
No posts in blog yet |
Reported Vulnerabilities
All Submissions VIP SubmissionsFeatured Submissions
Domain | Reported | Status | Type |
26.06.2019
|
unpatched
|
Cross Site Scripting
|
Please login via Twitter to add a recommendation