Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 328,765 coordinated disclosures
190,762 fixed vulnerabilities
408 bug bounties with 864 websites
9,210 researchers, 854 honor badges

SecuNinja Top VIP Security Researcher of the Month | Security Researcher Profile


Security researcher SecuNinja has already helped fix 3109 vulnerabilities.



Researcher reputation:  780

Real name:
SecuNinja

About me:
white-hat and I'm nice :)

How to contact me:
English or German:

[email protected]
https://twitter.com/secuninja

Certifications & Diplomas:
CCNA and others

Experience in Application Security
3-5 years

Award / Bug Bounty I prefer:
Feel free to provide Bug Bounty:
PayPal, Vouchers, BTC, public recognition, tweets or any kind of swag

Halls of Fame:
listed on my website https://secu.ninja

Follow me on:
Twitter

Recommendations and Acknowledgements

    29 June, 2017
     1und1 Andreas Maurer from 1&1 Internet:
Secuninja reported a severe vulnerability on our website. He was fast, polite and professional. A great help and much appreciated.
    23 November, 2018
     testberichteDE Andreas S from Testberichte.de:
Hi SecuNinja, thank you very much for your information on our vulnerability! This helps us keeping our website secure.
    12 November, 2018
     Tgirl_Christin Christin Löhner from Akademie für Sport und Gesundheit:
Thanks to SecuNinja, who has found a vulnerability on our website. After claiming the site here on OpenBugBounty and so getting the information about the vulnerability, I was able to fix it in seconds. Thanks again, for hunting! Christin
    10 October, 2018
     GeorgiHristov George Hristov from Webit.org:
Many thanks to SecuNunja for fast and helpful response about problems of our website.
    17 September, 2018
     RajatAr51352684 Rajat from ESCADA SE:
thanks a lot for reporting security vulnerability in our website. Great work and very supportive in case of additional questions.
    12 September, 2018
     endurit1 Christian from endurit gmbh:
Thank you, SecuNinja, for pointing out a vulnerability on one of our websites. And for the professional support.
    17 July, 2018
     winterreise1978 Gregor from Gregor:
Thank you for alerting to an XSS vulneribilty on our site. We fixed it thanks to your alert.
    11 July, 2018
     cms_admin CMSAdmin from European University Viadrina:
Secuninja has helped us to secure our website. Quickly, friendly and most of all professional.
Thank You!
    27 June, 2018
     gerryfort Gerry from BikeBug:
Secuninja reported a vulnerability on our website. He was polite to deal with and professional. A great help and much appreciated. Highly recommend!
    20 June, 2018
     medizinfuchs Tobi from medizinfuchs GmbH:
Thank you very much for finding of a XSS Vulnerability on our website!
Great job, very competent, friendly and quick replies.

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Awards and Achievements


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:6775
Total reports on VIP sites:324
Total patched vulnerabilities:3109
Total vulnerabilities on Hold (Open Bug Bounty):358
Recommendations received:62
Active since:13.03.2017
Top Security Researcher Awards: Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Week

Open Bug Bounty Certificate





No posts in blog yet


Reported Vulnerabilities

All Submissions VIP Submissions

Domain Reported Status Type
21.03.2017
unpatched
Cross Site Scripting
21.03.2017
patched
Cross Site Scripting
21.03.2017
patched
Cross Site Scripting
21.03.2017
unpatched
Cross Site Scripting
21.03.2017
patched
Cross Site Scripting
21.03.2017
unpatched
Cross Site Scripting
21.03.2017
patched
Cross Site Scripting
21.03.2017
patched
Cross Site Scripting
21.03.2017
patched
Cross Site Scripting
21.03.2017
patched
Cross Site Scripting
20.03.2017
unpatched
Cross Site Scripting
20.03.2017
patched
Cross Site Scripting
20.03.2017
patched
Cross Site Scripting
20.03.2017
patched
Cross Site Scripting
20.03.2017
unpatched
Cross Site Scripting
19.03.2017
patched
Cross Site Scripting
19.03.2017
patched
Cross Site Scripting
19.03.2017
patched
Cross Site Scripting
19.03.2017
unpatched
Cross Site Scripting
19.03.2017
patched
Cross Site Scripting

  Latest Patched

 23.03.2019 etsu.edu
 23.03.2019 dump.xxx
 23.03.2019 vipon.com
 23.03.2019 jeuxjeuxjeux.fr
 23.03.2019 domainnamesales.com
 23.03.2019 bonprix.de
 23.03.2019 discogs.com
 22.03.2019 jrailpass.com

  Latest Blog Posts

22.03.2019 by HackerGautam
TLS 1.3 Genesis, Mechanism and Working
19.03.2019 by Open Bug Bounty
GDPR PII exposure can now be securely reported via Open Bug Bounty
24.02.2019 by ismailtsdln
Apple XSS Vulnerability - Proof of Concept (PoC)
24.02.2019 by ismailtsdln
How do you use an xss as a keylogger ?
23.02.2019 by ismailtsdln
Everything about XSS is in this source!

  Recent Recommendations

    22 March, 2019
     jcfmachado:
Thank you for your time and notification.
    19 March, 2019
     rogerdc01:
Ezio has helped me with a vulnerability. Answered very fast after some questions and showed the way to examine the issue. Very professional!
    19 March, 2019
     interactmultim1:
Thank you k0t for reporting this bug. We appreciate your work!
    19 March, 2019
     CoreInstance:
Armin, vielen Dank für deine professionelle Unterstützung! Dank deiner Hilfe, konnten wir die Schwachstelle bei unserem Kunden direkt beheben.
    18 March, 2019
     ArnY:
Un grand merci pour votre aide. Suite à votre retour rapide et précis la faille a été corrigée rapidement par nos équipes.