Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 328,405 coordinated disclosures
190,166 fixed vulnerabilities
405 bug bounties with 859 websites
9,193 researchers, 853 honor badges

ELProfesor Top Security Researcher of the Month | Security Researcher Profile


Security researcher ELProfesor has already helped fix 1947 vulnerabilities.



Researcher reputation:  900

Real name:
TAHA SMILY

About me:
Our Democracy has been Hacked ! F**K society

How to contact me:
this is my email adresse : [email protected]

Alternative Contacts:
https://www.linkedin.com/in/taha-smily-195aa3145/

Experience in Application Security
3-5 years

Award / Bug Bounty I prefer:
I prefer :
- Rewards
- Benefits Gifts
- Swag
- Hall of Fame
- Acknowledgment
- PayPal Money


Anything that you wish to award me will motivate me to continue doing what I'm doing

Follow me on:
Twitter
LinkedIn

Recommendations and Acknowledgements

    26 February, 2019
     felixbuenemann Felix Bünemann from LOUIS INTERNET:
Responsibly disclosed an XSS problem in a customer's website with working PoC that could quickly be fixed.
    2 January, 2019
     SOSLaChapelle Dev from QL:
Thanks for the information and report. The issue has been patched.
    28 November, 2018
     jcopley Joe Copley from Copley Internet Systems:
Thank you very much for informing us about a security vulnerability on our site. It has been patched. Keep up the good work!
    24 November, 2018
     laviavigdor Lavi from Simania:
Thank you for reporting XSS issues. It's patched now.
    21 November, 2018
     dJoceNet Jocelyn from eiffel.org:
Thank you for notifying us of the issue and check it was fixed!
    19 November, 2018
     doccry Thorsten from digenial GmbH:
Many thanks for your XSS reporting
    13 November, 2018
     HoutVasthouden Bert from Woodwize:
Thank you for reporting XSS issues. It's patched now.
    31 October, 2018
     davidbehler David from PrepLounge:
Thank you very much for informing us about a XSS vulnerability.
    24 October, 2018
     VytautasKr Vytautas from not-disclosed:
Thank you for taking the time and notifying about the issue in a responsible fashion!
    16 October, 2018
     euvtechnology euvtechnology from Engel & Völkers Technology:
Dear Taha, Thank you for reporting the XSS vulnerability you discovered on our website and helping us ensuring the security of our webservices.

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Awards and Achievements


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:5186
Total reports on VIP sites:1177
Total patched vulnerabilities:1947
Total vulnerabilities on Hold (Open Bug Bounty):238
Recommendations received:60
Active since:12.10.2017
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate





No posts in blog yet


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
26.10.2017
unpatched
Cross Site Scripting
25.10.2017
unpatched
Cross Site Scripting
25.10.2017
unpatched
Cross Site Scripting
25.10.2017
unpatched
Cross Site Scripting
25.10.2017
unpatched
Cross Site Scripting
25.10.2017
patched
Cross Site Scripting
24.10.2017
patched
Cross Site Scripting
24.10.2017
patched
Cross Site Scripting
24.10.2017
unpatched
Cross Site Scripting
24.10.2017
unpatched
Cross Site Scripting
24.10.2017
unpatched
Cross Site Scripting
24.10.2017
unpatched
Cross Site Scripting
24.10.2017
unpatched
Cross Site Scripting
24.10.2017
patched
Cross Site Scripting
24.10.2017
patched
Cross Site Scripting
24.10.2017
patched
Cross Site Scripting
24.10.2017
unpatched
Cross Site Scripting
24.10.2017
unpatched
Cross Site Scripting
24.10.2017
patched
Cross Site Scripting
24.10.2017
unpatched
Cross Site Scripting

  Latest Patched

 22.03.2019 livestream.com
 21.03.2019 vuetifyjs.com
 21.03.2019 365psd.com
 21.03.2019 ecartelera.com
 21.03.2019 bergfex.at
 20.03.2019 billabong.com
 20.03.2019 gcu.ac.uk
 20.03.2019 condos.ca
 20.03.2019 yesmovies.gg
 20.03.2019 gold.de

  Latest Blog Posts

19.03.2019 by Open Bug Bounty
GDPR PII exposure can now be securely reported via Open Bug Bounty
24.02.2019 by ismailtsdln
Apple XSS Vulnerability - Proof of Concept (PoC)
24.02.2019 by ismailtsdln
How do you use an xss as a keylogger ?
23.02.2019 by ismailtsdln
Everything about XSS is in this source!
20.02.2019 by drok3r
ModSecurity - ByPass XSS

  Recent Recommendations

    22 March, 2019
     jcfmachado:
Thank you for your time and notification.
    19 March, 2019
     rogerdc01:
Ezio has helped me with a vulnerability. Answered very fast after some questions and showed the way to examine the issue. Very professional!
    19 March, 2019
     interactmultim1:
Thank you k0t for reporting this bug. We appreciate your work!
    19 March, 2019
     CoreInstance:
Armin, vielen Dank für deine professionelle Unterstützung! Dank deiner Hilfe, konnten wir die Schwachstelle bei unserem Kunden direkt beheben.
    18 March, 2019
     ArnY:
Un grand merci pour votre aide. Suite à votre retour rapide et précis la faille a été corrigée rapidement par nos équipes.