Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
532,749 coordinated disclosures
333,280 fixed vulnerabilities
784 bug bounties with 1,550 websites
15,896 researchers, 1098 honor badges

KikyTokamuro | Security Researcher Profile


Security researcher KikyTokamuro has already helped fix 13 vulnerabilities.



Researcher reputation:  0

Real name:
Daniil

About me:
Security researcher.
Interests: reverse engineering, penetration testing, low-level programming, web security.

How to contact me:
Twitter: @kiky_tokamuro
Email: [email protected]
Telegram: @kikytokamuro

Experience in Application Security
1-3 years

Award / Bug Bounty I prefer:
T-Shirt, Bug Bounty Payment

PayPal: [email protected]

Buy me a coffee: https://www.buymeacoffee.com/KikyTokamuro

Yandex Money: https://money.yandex.ru/to/410012410249581

Halls of Fame:
https://yandex.ru/bugbounty/researchers/kiky-tokamuro/

Follow me on:
Twitter

Recommendations and Acknowledgements

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:125
Total reports on VIP sites:8
Total patched vulnerabilities:13
Total vulnerabilities on Hold (Open Bug Bounty):28
Active since:30.01.2020



No posts in blog yet


Reported Vulnerabilities

All Submissions VIP Submissions

Domain Reported Status Type
17.04.2020
On Hold
Cross Site Scripting
17.04.2020
On Hold
Cross Site Scripting
17.04.2020
On Hold
Cross Site Scripting
12.04.2020
patched
Cross Site Scripting
12.04.2020
On Hold
Cross Site Scripting
12.04.2020
On Hold
Cross Site Scripting
11.04.2020
On Hold
Improper Access Control 
30.03.2020
On Hold
Cross Site Scripting
30.03.2020
On Hold
Cross Site Scripting
15.03.2020
On Hold
Cross Site Scripting
15.03.2020
On Hold
Cross Site Scripting
11.03.2020
On Hold
Cross Site Scripting
11.03.2020
On Hold
Cross Site Scripting
11.03.2020
patched
Cross Site Scripting
11.03.2020
On Hold
Improper Access Control 
11.03.2020
On Hold
Cross Site Scripting
11.03.2020
On Hold
Cross Site Scripting
11.03.2020
On Hold
Cross Site Scripting
11.03.2020
On Hold
Cross Site Scripting
05.03.2020
On Hold
Cross Site Scripting

  Latest Patched

 26.05.2020 plantronics.com
 26.05.2020 benditofutbol.com
 25.05.2020 alaneesqatar.qa
 25.05.2020 shorturl.at
 25.05.2020 torrentoon.com
 25.05.2020 www1.eeoc.gov
 25.05.2020 fcrs.treas.gov
 25.05.2020 bankiros.ru
 25.05.2020 eichberg.ws
 25.05.2020 dhs.mn.gov

  Latest Blog Posts

04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports
29.02.2020 by Rando02355205
(Google) groups.google.com - [Stored XSS] - [Bug Bounty] - [WriteUp] - [24/02/2020]
10.02.2020 by 0xrocky
Stored XSS on h2biz.net

  Recent Recommendations

    26 May, 2020
     chrisjimallen:
Very helpful insights, spotted something I'd overlooked.
    25 May, 2020
     thisismeraul:
Thanks for finding this vulnerability for us. The corporate website is more secure now. Good job!
    25 May, 2020
     VICTOR__Europe:
Thank you for helping us to fix the critical SQL injection.
Friendly contact, thanks for the effort.
    25 May, 2020
     vovsoft:
Thank you very much for finding the bug on our website and your responsible disclosure. Absolutely appreciated. You make the web a better place!
    25 May, 2020
     JoseAnt29908185:
We are very grateful to Broly157 for his help. He found on our website a security vulnerability related to cross site scripting , so we contacted him and in a very short he gave us a more detailed report and some very useful guidelines to solve the problem.