Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 456,365 coordinated disclosures
244,382 fixed vulnerabilities
604 bug bounties with 1224 websites
12,321 researchers, 962 honor badges

Renzi Top VIP Security Researcher of the Month | Security Researcher Profile


Security researcher Renzi has already helped fix 6401 vulnerabilities.



Researcher reputation:  530

Real name:
Felipe Gabriel Renzi

About me:
-> Cyber Security Analyst and Security Researcher (Brazil).
-> We can make Web a Safer Place.

How to contact me:
-> E-mail: [email protected]
-> Contact me as soon as possible to protect your web application!

Certifications & Diplomas:
-> Forest Engineering - UNESP
-> Information Security - SENAC

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
-> Bounty Payment (PayPal).
-> Public Recognition & thanks (Here).
-> Swag (T-shirt, stickers, cups).
-> Job Offer (Pentest or Vulnerability Assessment).
-> Vouchers (eg. Amazon Brazil)

Halls of Fame:
SoundCloud, Western Union, Alibaba, T-mobile, Telefonica, Huawei, Skyscanner and Jet.

Follow me on:
Twitter

Recommendations and Acknowledgements | Full List:

    24 September, 2019
     ukegawa ukegawa from kurogo:
Thank you for the report! We appreciate it.
    2 May, 2019
     AndyTrier Andreas from Trier-Saarburg:
Felipe found a XSS flaw in one of our web pages, and kindly told us about it so that we could address it. We'd like to thank Felipe for his prompt and professional disclosure.
    30 April, 2019
     KoegelGmbH Daniel from Kögel:
Felipe kindly pointed out an XSS problem to us. Thanks to his support, we were able to solve the problem quickly.
Thank you very much Felipe, your help is highly appreciated!
    25 April, 2019
     artinberlin Christoph Thomessen from Kuag:
Felipe fand einen XSS Fehler in einer unserer Web-Seiten und gab uns Tipps für ein sicheres Internet. Vielen Dank.
    23 April, 2019
     buerofuenf Jens from Büro 5 GmbH:
Felipe found a XSS security vulnerability in one of our customers site. We fixed it accordingly. He was very fast in answering and very supportive. Thank you very much, your help is highly appreciated! We will keep you in mind for future security checks on other websites.
    15 April, 2019
     matthias_lueck Matthias Lück from Brinkmann Audio:
Felipe found a vulnerability in our website , which we were able to fix with Felipes detailed report. He was very responsive and professional. Highly recommended!
Thank you very much Felipe!
    22 January, 2019
     Majestic Philip Aggrey from Majestic:
Following Felipe's disclosure, we have now fixed the Reflected Cross-Site Scripting web vulnerability you discovered in our "www.majestic12.co.uk" web-application. We'd like to thank Felipe for his prompt and professional disclosure.
    22 January, 2019
     DJB31st Dave Beaumont :
Found a xss issue, quickly emailed with the affected pages and links to aid resolving. Many thanks
    2 November, 2018
     jddimarco John DiMarco from University of Toronto Computer Science Dept:
Felipe found a XSS flaw in one of our researchers' web pages, and kindly told us about it so that we could address it. Thank you, Felipe.
    2 October, 2019
     ToshiharuKuroy1 Kuroyanagi :
Thanks to Felipe's advice, we could fix potential XSS threat.
And we appreciate his very kind and proffesional support.
Thanks a lot.
    1 October, 2019
     UUCSIRT Hans Liss from Uppsala university:
Thank you for the vulnerability report! We appreciate it.
    24 September, 2019
     ukegawa ukegawa from kurogo:
Thank you for the report! We appreciate it.
    19 September, 2019
     sagawa89 sagawa from Rapha Ltd.:
I am grateful for finding the problem of my customers site.
    12 September, 2019
     IidaKatsuyoshi Katsuyoshi Iida from Hokkaido Univ:
Felipe found a vulnerability in our web pages, and he kindly told us how to deal with it. Thank you very much!
    28 August, 2019
     TucWebmaster TUCWebmaster from TU Chemnitz:
Thanks for your work! Without people like you who investigate time in discovering security flaws especially university and other public authority servers would stay unprotected much longer.
    27 August, 2019
     EricLucas_ Eric L from IARC:
Felipe reported an XSS problem to us. Thanks to his prompt support, we were able to identify and solve the problem quickly.
Thank you very much Felipe, your great input is highly appreciated and useful!
    14 August, 2019
     runlevelone runlevelone :
Thank you for your great input!
    5 August, 2019
     y0s Yoshi Morimura from Kyoto Univ.:
Felipe found a XSS problem on one of our websites. He responded to me quickly and friendly, which helped us a lot. Thank you so much!
    5 August, 2019
     sugizouw hisashi from University of Yamanashi.:
I advised you about the vulnerability.
Thank you.
    5 August, 2019
     sugizouw hisashi from University of Yamanashi.:
I advised you about the vulnerability.
Thank you.
    4 August, 2019
     mijomarkose Milton Markose from University of Waikato:
I would like to thanks Felipe for his responsible XSS disclosure in one of our website. Felipe was very helpful in detailing the vulnerability and given the details, we need to fix it. Thank you very much and keep up the good security work. Cheers
    3 August, 2019
     NewLineHorizon1 Melisa from NewLineHorizon:
Dear,

Thanks for participating in responsible disclosure program.
The reports you submitted were extremely helpful to our team and provided us the details we needed to resolve the issues that you identified.
We are deeply committed to provide a safe and secure experience to our users and are therefore grateful for your efforts to help us improve our services.

Best Regards!
    3 August, 2019
     CiubanAdrian Adrian from powershow.com:
Big thanks to Felipe for finding the vulnerability on our website.He responded very quickly to our email, explained what the problem is and provided an example so we can fix the issue.
Thank you Felipe!
Highly Recommended.
    22 July, 2019
     shinguz Shinguz from topodb.ch:
A big thank you to Felipe for the vulnerability report of the Cross-Site Scripting (XSS) attacks! The report was detailed enough, with a simple example, to let me quickly verify and fix the issue.
    17 July, 2019
     DarrenSproats Darren from Ironcore:
Felipe found a vulnerability on two of our websites , which we were able to fix with his detailed instructions. Thanks for your help, Felipe! Highly recommended.
    17 July, 2019
     batavlz batavlz from VLI Z:
Thanks for reporting a security issue, much appreciated.
    17 July, 2019
     Asif98959182 Asif from BC Pension Corp:
Felipe found a vulnerability on our website and reported to us.
I found him very ethical and professional.
I want to say him “Thanks” for all the help!
    17 July, 2019
     psaulnier Paul from SJHS:
Felipe found a vulnerability on our website, which we were able to fix quickly with the details provided. Thank you!
    15 July, 2019
     MPDL MPDL from MPDL:
Felipe found a vulnerability in our website, which we were able to fix with his detailed report. Highly recommended! Thank you very much Felipe!
    15 July, 2019
     joeppy Joep from Camptoo:
Felipe found & reported an XSS flaw on our website to us and was quick to provide us with the details when we contacted him. We were able to patch the flaw within a day.
Thank you, Felipe!
    12 July, 2019
     fwchj fwchj from fwchj:
Felipe helped us identify a XSS flaw on our login page, which we were able to fix. Thank you!
    3 July, 2019
     andryou Andrew :
Many thanks Felipe for your responsible disclosure and info on how to address it!
    15 May, 2019
     mrroessel Mario Rössel from Memory Alpha:
Felipe found a XSS vulnerability on my website. With his prompt help I was able to fix it.

Thank you very much Felipe!
    15 May, 2019
     Shopweezle Andreas from Company:
Thanks for help fixing issues.
fast communication; good job.

But this portal doesnt change status after fixing. Why?
    2 May, 2019
     PaulAtTheHug Paul Oldham from The Hug:
Bit slow to respond (ten days) but did find a XSS vulnerability which was worth patching.
    20 January, 2019
     fparisot Fabrice PARISOT from Fab's AutoBackup:
Felipe found an XSS security flaw on my website's landing page. He kindly told which one was affected and I could fix it. I do not run a big company (self employed) and cannot afford huge paypal rewards (at least for now, it hope this will change ;) ). If he finds something wrong on your website and you can reward him, just do it because he truly deserves it! Highly recommended.
Thanks a lot man!

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:14685
Total reports on VIP sites:18
Total patched vulnerabilities:6401
Total vulnerabilities on Hold (Open Bug Bounty):4238
Recommendations received:36
Active since:31.05.2018
Top Security Researcher Awards: Top Security Researcher of the Month

Open Bug Bounty Certificate



01.10.2019  #Security 100%

13.08.2019  XSSCon - XSS Tool @Kitploit

Powerfull Simple XSSScanner made with python 3.7

Download: https://github.com/menkrep1337/XSSCon

Reference: https://www.kitploit.com

01.05.2019  1000's of default passwords on http://open-sez.me

01.05.2019  Fuxploider - @almandin

" Fuxploider is an open source penetration testing tool that automates the process of detecting and exploiting file upload forms flaws. This tool is able to detect the file types allowed to be uploaded and is able to detect which technique will work best to upload web shells or any malicious file on the desired web server. "

01.05.2019  Sysadminotaur


Reported Vulnerabilities

All Submissions VIP Submissions

Domain Reported Status Type
10.09.2019
patched
Cross Site Scripting
10.09.2019
patched
Cross Site Scripting
10.09.2019
patched
Cross Site Scripting
10.09.2019
patched
Cross Site Scripting
10.09.2019
On Hold
Cross Site Scripting
10.09.2019
patched
Cross Site Scripting
10.09.2019
patched
Cross Site Scripting
10.09.2019
patched
Cross Site Scripting
10.09.2019
patched
Cross Site Scripting
10.09.2019
On Hold
Cross Site Scripting
10.09.2019
patched
Cross Site Scripting
10.09.2019
On Hold
Cross Site Scripting
10.09.2019
On Hold
Cross Site Scripting
10.09.2019
patched
Cross Site Scripting
10.09.2019
On Hold
Cross Site Scripting
10.09.2019
On Hold
Cross Site Scripting
10.09.2019
patched
Cross Site Scripting
10.09.2019
On Hold
Cross Site Scripting
10.09.2019
On Hold
Cross Site Scripting
10.09.2019
On Hold
Cross Site Scripting

  Latest Patched

 23.10.2019 gramha.net
 23.10.2019 deskgram.net
 22.10.2019 jpnn.com
 22.10.2019 iphoneitalia.com
 22.10.2019 biggo.com.tw
 22.10.2019 you2repeat.com
 21.10.2019 bfmtv.com
 21.10.2019 carbon38.com
 21.10.2019 register.it
 21.10.2019 business-standard.com

  Latest Blog Posts

17.10.2019 by 0xrocky
Stored XSS
17.10.2019 by geeknik
The "S" in IOT is for Security
16.10.2019 by darknetguy
Best XSS Vectors
01.10.2019 by Renzi25031469
#Security 100%
18.09.2019 by Leon
SSRF | Reading Local Files from DownNotifier server

  Recent Recommendations

    23 October, 2019
     rendkul:
thanks for informing us about xss vulnerability.
    23 October, 2019
     raviakp1004:
Thanks for letting us know about this XSS vulnerability. We appreciate the quick feedback.
    23 October, 2019
     Mrrain_1996:
Thank you a lot for the information and the support on fixing the issue! Very friendly and kind contact.
    23 October, 2019
     faizan_mark:
Thank you a lot for the information and the support on fixing the issue! Very friendly and kind contact.
    22 October, 2019
     BountyNeuvoo:
Dear,

Thank you for participating in our responsible disclosure program.

You helped us to solve a security vulnerability by informing us directly and delivering comprehensible examples.

We greatly appreciate your assistance in helping us maintain the security of our services.

Best regards