Infosec Institute

Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute

The Hacker News

Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News

Platform update: please use our new authentication mechanism to securely use the Open Bug Bounty Platform.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,600,552 coordinated disclosures
1,250,083 fixed vulnerabilities
1,861 bug bounty programs, 3,729 websites
40,034 researchers, 1,612 honor badges

Tanzil | Security Researcher Profile

Security researcher Tanzil has already helped fix 3665 vulnerabilities.

Researcher reputation:  320

Real name:
Tanzil Khan

About me:
Tech Geek
Love to find vulnerabilities :)
Work for Money $$$$

Contact email:
[email protected]

Alternative Contacts:
Whats app: 8801679549770

Certifications & Diplomas:
3-4 years

Award / Bug Bounty I prefer:
A Thanks/profile recommendation will be appreciated, with any of them given below:

-> Gifts, Gift_Cards, Mug

-> HOF

-> Payoneer (IBAN)
-> City Bank (Agent Banking) SWIFT
-> Cryptocurrency

Halls of Fame:
more will update s

Follow me on:

Ethics and Rules:
Tanzil Khan is required to abide by the ethics and rules of the Open Bug Bounty project. If you reasonably believe that rules are not respected, please report this to us.

Recommendations and Acknowledgements

@pierremuset     29 November, 2022
    Twitter pierremuset Pierre Muset from Beetween:
Tanzil reported an XSS vulnerability on a website we manage (wordpress) and provided us with enough information to help us identifying the issue ; we were able to fix it rapidly.
Thank you Tanzil, we appreciate the help!
@Tom76007886     28 March, 2022
    Twitter Tom76007886 Thomas from Iowa Food Foundation:
Tanzil reported an XSS vulnerability and was quick to respond with details. Tanzil was available for more information and help if we needed help to patch the issue. Thank you Tanzil for your diligent work and quick responses!
@lidlmiddleaisle     27 October, 2021
    Twitter lidlmiddleaisle Karl from ESNEFT:
Dear Tanzil, thanks for alerting us to XSS vulnerabilities on our site!
@kitcert     14 October, 2021
    Twitter kitcert Peter Oettig from Karlsruhe Institute of Technology:
KIT-CERT would like to thank Tanzil Khan for responsibly disclosing an XSS-Vulnerability on one of our departments websites and offering the time required to fix the issue!
@kieluni     2 August, 2021
    Twitter kieluni Jan Winters from Christian-Albrechts-Universität zu Kiel (CAU):
Thanks Tanzil for respectfully reporting a XSS problem on one of our department working group's servers from 2018. The vulnerable tool in question has been removed.
@NeilThePhoneGuy     19 February, 2021
    Twitter NeilThePhoneGuy James from PastTimesProject:
Thank you for informing us of the vulnerability and guidelines explaining the issue allowing us to implement a fix.
@WeaverOfWeb     9 February, 2021
    Twitter WeaverOfWeb Ewan from Pole Emporium:
Thanks for letting us know about this, much appreciated!
@JasonKeltz1     8 December, 2020
    Twitter JasonKeltz1 Jason from York University EECS:
Thank you Tanzil for reporting a cross-scripting vulnerability on one of our members course web sites from 2017, improving our web site security. The site in question has been removed.
@antpbe     8 December, 2020
    Twitter antpbe antp from
Thanks for the notification for a vulnerability that I missed, despite I thought having well checked.
@ResultClothing     12 November, 2020
    Twitter ResultClothing Erika from Result Clothing:
Appreciate your discovery and notification of a bug so that we can increase our security!

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Honor Badges

Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

10+ Recommends
25+ Recommends
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics

Total reports:19154
Total reports on VIP sites:218
Total patched vulnerabilities:3665
Total vulnerabilities on Hold (Open Bug Bounty):10
Recommendations received:19
Active since:04.05.2020

Open Bug Bounty Certificate

Researcher Certificate

Reported Vulnerabilities

All Submissions VIP Submissions

No posts in blog yet

  Latest Patched


  Latest Blog Posts

21.09.2023 by Open Bug Bounty
Top 10 Ways to Get Started with Bug Bounty Hunting
21.09.2023 by Open Bug Bounty
Top 10 Bug Bounty Resources
18.09.2023 by Open Bug Bounty
What Is OpenBugBounty and How It Works
18.09.2023 by Open Bug Bounty
Coordinated Vulnerability Disclosure
20.07.2023 by W4H33D_
Learn Command Injection Vulnerabilities

  Recent Recommendations

    22 September, 2023
Thank you for pointing out the vulnerability. Your report was very helpful!
    6 September, 2023
Much appreciated the notice from Dipu1a about our website. He provided clear guidelines to resolve and I'm looking forward to working with him in the future.
    5 September, 2023
Thank you very much for reporting the vulnerability. Good luck with your everything!!!
    4 September, 2023
Your report was very helpful! Thank you very much !
    25 August, 2023
Thank you for your help in ensuring the security of our domain and its visitors! Your contributions are invaluable.