Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 454,221 coordinated disclosures
242,780 fixed vulnerabilities
601 bug bounties with 1221 websites
12,269 researchers, 960 honor badges

RootByte | Security Researcher Profile


Security researcher RootByte has already helped fix 871 vulnerabilities.



Researcher reputation:  0

Real name:
Jonathan Paz

About me:
Ethical CyberSecurity Researcher, Defcon DC664 Admin, WebTrafficker, COD Player

How to contact me:
[email protected]

Alternative Contacts:
https://rootbyte.com/

Certifications & Diplomas:
Intel, ESET, Google, Ec-Council, DragonJar, etc

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
You can donate to my PayPal account 25dlls, 50dlls, 100dlls, 500dlls, or whatever you can :)

My PayPal account: https://www.paypal.me/rootbyte
Or
My PayPal Mail account: [email protected]

Halls of Fame:
Dell, DragonJar, etc

Follow me on:
Twitter

Recommendations and Acknowledgements

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:1510
Total reports on VIP sites:447
Total patched vulnerabilities:871
Active since:20.02.2015
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate





No posts in blog yet


Reported Vulnerabilities

All Submissions VIP Submissions

Domain Reported Status Type
08.03.2018
patched
Cross Site Scripting
08.03.2018
unpatched
Cross Site Scripting
08.03.2018
patched
Cross Site Scripting
08.03.2018
patched
Cross Site Scripting
08.03.2018
patched
Cross Site Scripting
08.03.2018
patched
Cross Site Scripting
08.03.2018
patched
Cross Site Scripting
08.03.2018
unpatched
Cross Site Scripting
07.03.2018
unpatched
Cross Site Scripting
07.03.2018
patched
Cross Site Scripting
07.03.2018
patched
Cross Site Scripting
07.03.2018
patched
Cross Site Scripting
07.03.2018
unpatched
Cross Site Scripting
07.03.2018
patched
Cross Site Scripting
07.03.2018
unpatched
Cross Site Scripting
07.03.2018
unpatched
Cross Site Scripting
07.03.2018
unpatched
Cross Site Scripting
07.03.2018
patched
Cross Site Scripting
07.03.2018
patched
Cross Site Scripting
07.03.2018
unpatched
Cross Site Scripting

  Latest Patched

 19.10.2019 day.az
 18.10.2019 thepiratebay10.org
 18.10.2019 ittefaq.com.bd
 18.10.2019 tutorialspoint.com
 18.10.2019 meteoprog.ua
 18.10.2019 atbmarket.com
 18.10.2019 karar.com
 18.10.2019 wine-searcher.com
 17.10.2019 smartbox.com
 17.10.2019 mightytext.net

  Latest Blog Posts

17.10.2019 by geeknik
The "S" in IOT is for Security
16.10.2019 by darknetguy
Best XSS Vectors
01.10.2019 by Renzi25031469
#Security 100%
18.09.2019 by Leon
SSRF | Reading Local Files from DownNotifier server
13.09.2019 by drok3r
Collection of information | Google Hacking and Dorks basic

  Recent Recommendations

    18 October, 2019
     Cineca1969:
Thank you 0xrocky for identifying a vulnerability and making us aware of it. Great security researcher to work with. Keep up the good work!
    17 October, 2019
     CosimoGdM:
A kudos to 0xrocky for his professional work in not using the identified vulnerabilities and alerting us
    17 October, 2019
     tschipie:
Thanks for the hint :)
Good work.
    17 October, 2019
     nickinckin:
Thanks to 0xrocky for identifying the vulnerability. Now we patched the vulnerability.
    17 October, 2019
     cloudrexx:
Thank you very much for making us aware of the issue and providing us a high quality vulnerability report which helped us identify the source of the vulnerability right away.