Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 328,651 coordinated disclosures
190,478 fixed vulnerabilities
407 bug bounties with 862 websites
9,207 researchers, 854 honor badges

OOS | Security Researcher Profile


Security researcher OOS has already helped fix 278 vulnerabilities.



Researcher reputation:  280

Real name:
Adel Boutin

About me:
Bug hunter,
Security researcher ,
Independent security consultant (web/desktop app).
Exploit developer (python) intermediate level,

I only love RCE and Buffer overflow.

I already have alerted Owner but no response ( http://attacker.work/archive/attacker/44/ )!!
Owner who dose not care about his users or his system or network, never deserve success.
put your users in top of your priority if you really want to success in your business, it's only my point of view.

How to contact me:
[email protected]




###::Note::
add me to your private program : https://hackerone.com/oos

Alternative Contacts:
[email protected]

Certifications & Diplomas:
OSCP

Experience in Application Security
3-5 years

Award / Bug Bounty I prefer:
Feel free to provide Bug Bounty:
PayPal wallet: [email protected]
BTC Wallet Address : 3APJqtYX6h8dcCWj9njhuK63Y7CgWabS9g
Hall of fame,
Certification of appreciation,
It's simply to add a public

Halls of Fame:
cpanel.com/cpanel-security-hall-of-fame/
cert.europa.eu
unite.un.org/content/hall-fame/
studis-online.de
geeksforgeeks.org
support.teamhively.com
agiftinside.com/security/acknowledgments.txt
.

Follow me on:
Twitter

Recommendations and Acknowledgements

    18 July, 2018
     hikingsite Raymond from Hiking-site.nl:
Thanks a lot Adel to help me to improve the security of my website. Your examples were very clear and to the point and your follow-up very thorough. Keep up the good work to make the internet a safer place!
    31 August, 2018
     n8manAfter Nathan from A Gift Inside:
Adel seems like a nice guy. Thanks for finding this XSS vulnerability and notifying us.
    26 August, 2018
     cb_ximo Kino from pista3:
Adel has found out and share a vulnerability on my site. Thanks a lot
    8 August, 2018
     fotoloco1 Blaise from fotoloco:
Excellent job in identifying a vulnerability on my site: thanks!
    16 July, 2018
     teamhively Julian from Hively:
Thanks very much Adel for the detailed, friendly report of the issue on our site and for the prompt, professional follow up emails.
    9 July, 2018
     JohanAdriaans Johan Adriaans from Shoppagina:
Thanks for finding the XSS bug and the quick and clean report. Keep up the good work!
    9 July, 2018
     Nu_Gratis Alexander Mes from NuGratis:
Thanks for pointing out a XSS bug in our website. Quick and good feedback!
    25 June, 2018
     ziduniwien Computer Center from University of Vienna:
Dear OOS,

The University of Vienna would like to thank you for your valuable contribution in finding a website security issue. Your input is highly welcome and helps to raise the security level of our educational institution.

Servus and greetings from Vienna, Austria.
    2 June, 2018
     digisolid Martin Otte from Klik-info.nl:
OOS found a XSS vulnerability on our website. Thank you very much!
    23 May, 2018
     yjacolin yjacolin from GeoRezo:
Thanks for helping discover an XSS bug on our sites. Good work.

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Awards and Achievements


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:951
Total reports on VIP sites:34
Total patched vulnerabilities:278
Total vulnerabilities on Hold (Open Bug Bounty):3
Recommendations received:13
Active since:02.03.2018

Open Bug Bounty Certificate





No posts in blog yet


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
20.02.2019
On Hold
Cross Site Scripting
08.02.2019
On Hold
Open Redirect
08.02.2019
On Hold
Open Redirect
01.10.2018
patched
Cross Site Scripting
06.09.2018
patched
Cross Site Scripting
02.09.2018
patched
Cross Site Scripting
02.09.2018
patched
Cross Site Scripting
02.09.2018
unpatched
Cross Site Scripting
02.09.2018
unpatched
Cross Site Scripting
02.09.2018
unpatched
Cross Site Scripting
02.09.2018
unpatched
Cross Site Scripting
02.09.2018
unpatched
Cross Site Scripting
02.09.2018
unpatched
Cross Site Scripting
02.09.2018
unpatched
Cross Site Scripting
31.08.2018
unpatched
Cross Site Scripting
28.08.2018
unpatched
Cross Site Scripting
28.08.2018
patched
Cross Site Scripting
28.08.2018
unpatched
Cross Site Scripting
28.08.2018
patched
Cross Site Scripting
28.08.2018
unpatched
Cross Site Scripting

  Latest Patched

 23.03.2019 bonprix.de
 23.03.2019 discogs.com
 22.03.2019 jrailpass.com
 22.03.2019 esa.int
 22.03.2019 thepetitionsite.com
 22.03.2019 temp-mail.org
 22.03.2019 weloveshopping.com
 22.03.2019 sixt.de
 22.03.2019 ioffer.com

  Latest Blog Posts

22.03.2019 by HackerGautam
TLS 1.3 Genesis, Mechanism and Working
19.03.2019 by Open Bug Bounty
GDPR PII exposure can now be securely reported via Open Bug Bounty
24.02.2019 by ismailtsdln
Apple XSS Vulnerability - Proof of Concept (PoC)
24.02.2019 by ismailtsdln
How do you use an xss as a keylogger ?
23.02.2019 by ismailtsdln
Everything about XSS is in this source!

  Recent Recommendations

    22 March, 2019
     jcfmachado:
Thank you for your time and notification.
    19 March, 2019
     rogerdc01:
Ezio has helped me with a vulnerability. Answered very fast after some questions and showed the way to examine the issue. Very professional!
    19 March, 2019
     interactmultim1:
Thank you k0t for reporting this bug. We appreciate your work!
    19 March, 2019
     CoreInstance:
Armin, vielen Dank für deine professionelle Unterstützung! Dank deiner Hilfe, konnten wir die Schwachstelle bei unserem Kunden direkt beheben.
    18 March, 2019
     ArnY:
Un grand merci pour votre aide. Suite à votre retour rapide et précis la faille a été corrigée rapidement par nos équipes.