Infosec Institute

Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute

The Hacker News

Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News

Platform update: please use our new authentication mechanism to securely use the Open Bug Bounty Platform.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,708,329 coordinated disclosures
1,357,476 fixed vulnerabilities
1,980 bug bounty programs, 3,897 websites
46,057 researchers, 1,643 honor badges

Dipu1ATop-50 VIP Open Redirect Reporter Top Security Researcher of the Month Top VIP Security Researcher of the Month | Security Researcher Profile


Security researcher Dipu1A has already helped fix 11380 vulnerabilities.



Researcher reputation:  880

Real name:
Md. Nur A Alam Dipu

About me:
I am a Bug bounty hunter and security Researcher. Feel free contact me for more details, so that we can work together and fix the issue ASAP.

https://hackerone.com/dipuhasan
https://bugcrowd.com/nuraalamdipu

If you think the report helps you to resolved the issue, Please don't forget to add recomendation and donation.

Contact email:
[email protected]

Alternative Contacts:
dipuhasan444(at)gmail.com

Certifications & Diplomas:
CSE graduate,Burp Suite Mastery, Penterster-LAB

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
Donation here:
https://www.buymeacoffee.com/dipu

Paypal: paypal.me/dipuhasan

Bitcoin(BTC wallet):
17viTdGtXkmNeQbmcgDBVv7e2rJDrRHZue
USDT:
0x7c98cff84afb5297b92ba59b6bec2a8cd3493f3

Halls of Fame:
Yahoo,Dell,Oracle,Intel,Eset,Sony,SAP,Ebay,Indeed,Bitdefender,
ATT,Europa,dev.to,Houzz,Eff,Digitialocean,Box,Spotify,Twitch,Buffer
over 100

Follow me on:
Twitter
Facebook
LinkedIn

Ethics and Rules:
Md. Nur A Alam Dipu is required to abide by the ethics and rules of the Open Bug Bounty project. If you reasonably believe that rules are not respected, please report this to us.

Recommendations and Acknowledgements

@GTCoSWeb     27 February, 2024
    Twitter GTCoSWeb College of Sciences from Georgia Tech:
Dipu1a helped notify us of a possible link exposure so we could remedy it quickly to avoid any issues.
@Designer149     9 January, 2024
    Twitter Designer149 Arjen from Opera Arias:
Thank you very much for the help! Your advice was very important to solve this vulnerability.
@AneilR     6 September, 2023
    Twitter AneilR Aneil Raghunanan from MEEI:
Much appreciated the notice from Dipu1a about our website. He provided clear guidelines to resolve and I'm looking forward to working with him in the future.
@ObbWku     28 September, 2022
    Twitter ObbWku SOC from Western Kentucky University:
Thank you for your responsible disclosure of our XSS vulnerability. You were very professional and helpful.
@anonpatcher     16 September, 2022
    Twitter anonpatcher anonpatcher from anonpatcher:
Thank you to Dipu1A for making us aware of an XSS vulnerability on our site. We promptly patched it following their guidance!
@alex_kellerz     31 August, 2022
    Twitter alex_kellerz Alex Keller from Stanford Engineering:
Acknowledgment and thanks to Dipu1a, who discovered and responsibly disclosed a security issue with one of our public websites. Dipu was prompt and professional, replying immediately with details on how to replicate.
@uliw     15 June, 2022
    Twitter uliw Uli from OpenText Usergroup:
Dipu1A responsibly disclosed an issue with our site configuration. The clear description and very fast response allowed us to fix it as quickly as possible. Thanks again for the hint and the great help!
@waffel67     23 May, 2022
    Twitter waffel67 Waffel67 from focus-www:
Thanks a lot for your support Dipu1a,
for finding a problem with some of our websites, disclosing it responsibly and responding quickly to emails with guided examples!
The errors sholud be fixed.
@drlippman     15 March, 2022
    Twitter drlippman David from WAMAP:
Thank you for identifying and reporting an XSS vulnerability.
@sgenevrier     31 December, 2021
    Twitter sgenevrier Sandrine from Journal des Palaces:
@Dipu1A found vulnerabilities on one of our websites, thanks to his report we were able to fix them quickly.

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:60561
Total reports on VIP sites:1678
Total patched vulnerabilities:11380
Total vulnerabilities on Hold (Open Bug Bounty):442
Recommendations received:57
Active since:24.03.2018
Top Security Researcher Awards:Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate


Researcher Certificate

Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions




No posts in blog yet










  Latest Patched

 27.03.2024 nccupress.nccu.edu.tw
 26.03.2024 schedule.cc.nih.gov
 26.03.2024 floraargentina.edu.ar
 25.03.2024 vtc.gov.tw
 25.03.2024 pedralva.mg.gov.br

  Latest Blog Posts

04.12.2023 by BAx99x
Unmasking the Power of Cross-Site Scripting (XSS): Types, Exploitation, Detection, and Tools
04.12.2023 by a13h1_
$1120: ATO Bug in Twitter’s
04.12.2023 by ClumsyLulz
How I found a Zero Day in W3 Schools
04.12.2023 by 24bkdoor
Hack the Web like a Pirate: Identifying Vulnerabilities with Style
04.12.2023 by 24bkdoor
Navigating the Bounty Seas with Open Bug Bounty

  Recent Recommendations

    20 March, 2024
    TechVitaverdura:
Great exchanges with this person, thank you for your help and your report
    20 March, 2024
    Mek:
He reported some vulnerabilities and oversights of security best practices on my small private project web page.
Was responsive to e-mail, unlike many other people, so yes, I can recommend him.
    20 March, 2024
    ztwo79:
We would like to thank Pooja for responsibly disclosing a Cross-Site Scripting (XSS) vulnerability in our website. Her prompt reporting and assistance in developing a fix were instrumental in ensuring the security of our users.
    16 March, 2024
    TorutheRedFox:
Thanks for the help with the XSS vulnerability. It was a quick fix.
    15 March, 2024
    adesignguy:
Reported an XSS vulnerability which was helpful and much appreciated. I have patched it now as soon as I saw the email which was forwarded onto me!