Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
541,636 coordinated disclosures
348,237 fixed vulnerabilities
816 bug bounties with 1,594 websites
16,692 researchers, 1133 honor badges

DkilerS2 | Security Researcher Profile


Security researcher DkilerS2 has already helped fix 108 vulnerabilities.



Researcher reputation:  110

Real name:
Daniel Gonçalo

About me:
23 Years Old Young Ethical Hacker & Web Application Security Researcher and i complete my university studies
I Encourage You To Contact Me ASAP So We Can Work Together To Quickly Protect Your Users/Website! All Communication Will Be Kept Private

*Note : If You Fixed Your Website Vulnerability, Please Don't Forget To Give Me Recommendations and Acknowledgements In My Open Bug Bounty Profile.

How to contact me:
Email : [email protected]
Facebook : https://www.facebook.com/DkLulZ/

Alternative Contacts:
Twitter : https://twitter.com/DkilerS2

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
A thanks/profile recommendation will be really appreciated, but if you'd like:

#Paypal : paypal.me/
#Gifs Card
#T-shirts
#Sweats
#Caps
#Stickers
#Keychains
etc

Halls of Fame:
https://security.olx.com/security-hall-of-fame.html 2020

Follow me on:
Twitter
Facebook
LinkedIn

Recommendations and Acknowledgements

    15 June, 2020
     riverlabteam Riverlab from Riverlab Team:
Thank you very much for reporting the vulnerability, for the report and for being totally considerate, continue the great work you are doing and congratulations!
    10 June, 2020
     MulticopterWH Josh from MCWH:
Found an insecure directory on our site and reported it. Very much appreciated and I hope we can do business in the future.
    10 June, 2020
     copostal Miguel Pinto from Ciberforma:
Thanks for reporting this issue. Continue the good work.
    9 June, 2020
     rmfs17 Ricardo from ISPGAYA:
We thank Daniel for reporting the security issue and for helping us resolve it. We are grateful and look forward to possible collaboration.
    28 May, 2020
     georgekgk George from Templates.com:
Thank you Daniel for helping us to find and fix that security issue!
    12 May, 2020
     Palmtop_pt Diogo Moura from Palmtop:
Thank you Daniel for helping companies to be more secure and look into security and also for the cooperation.
    11 May, 2020
     goncalobmartins Gonçalo Martins from Quintela e Penalva – Real Estate:
Many thanks for reporting the issues on website.
    27 April, 2020
     HugoCae48312584 Hugo Caetano from Universidade Católica Portuguesa:
Many thanks for the great report and the excellent communication.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:1057
Total reports on VIP sites:229
Total patched vulnerabilities:108
Total vulnerabilities on Hold (Open Bug Bounty):945
Recommendations received:8
Active since:20.04.2020
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate





No posts in blog yet


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
06.07.2020
On Hold
Cross Site Scripting
03.07.2020
On Hold
Cross Site Scripting
03.07.2020
On Hold
Cross Site Scripting
03.07.2020
On Hold
Cross Site Scripting
02.07.2020
On Hold
Cross Site Scripting
02.07.2020
On Hold
Cross Site Scripting
02.07.2020
On Hold
Cross Site Scripting
29.06.2020
On Hold
Cross Site Scripting
29.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
24.06.2020
On Hold
Cross Site Scripting
24.06.2020
On Hold
Cross Site Scripting
24.06.2020
On Hold
Cross Site Scripting
23.06.2020
On Hold
Cross Site Scripting
23.06.2020
On Hold
Improper Access Control 
23.06.2020
On Hold
Improper Access Control 
22.06.2020
On Hold
Cross Site Scripting
22.06.2020
On Hold
Cross Site Scripting

  Latest Patched

 09.07.2020 axfc.net
 08.07.2020 arise.com
 08.07.2020 bloter.net
 08.07.2020 adzuna.com.au
 08.07.2020 tuniscope.com
 08.07.2020 jimms.fi
 08.07.2020 daniweb.com
 07.07.2020 wikizero.com
 07.07.2020 thimpress.com
 07.07.2020 kayqer.am

  Latest Blog Posts

24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs & Security Vulnerabilities | Bug Bounty Tutorials 2020
24.06.2020 by 0xcrypto
Improper Access Control - Generic: Unrestricted access to any "connected pack" on docs in coda.io
04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports

  Recent Recommendations

    8 July, 2020
     baladulan:
Armin, vielen Dank für deine Unterstützung!
    6 July, 2020
     aldraHastur:
Vielen Dank für den Hinweis, mit dem wir eine Lücke im System schließen konnten.
    4 July, 2020
     TadeuszWiew:
Thank you for finding and reporting the vulnerability on our website.
Great job! :)
    2 July, 2020
     booksprice:
Thank you for reporting the bug, and the clear details, much appreciated.
    1 July, 2020
     matthews8000:
Manish has correctly identified a vulnerability and suggested an appropriate fix. This has lead to an improvement in the security of the website.