Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 277,864 coordinated disclosures
160,095 fixed vulnerabilities
223,108 websites, 17,613 VIP websites
7,423 researchers, 6,915 subscribers

Thirup | Security Researcher Profile


Security researcher Thirup has already helped fix 192 vulnerabilities.



Researcher reputation:  10

Real name:
Martin Thirup Christensen

How to contact me:
[email protected]

Experience in Application Security
3-5 years

Award / Bug Bounty I prefer:
bank transfer, gift/whatever people may feel like. A recommendation is also appreciated

Halls of Fame:
AT&T:
Deutsche Telekom
Ebay
Yahoo
Microsoft
Ebay
US DoD

more: https://hackerone.com/mthirup/thanks
and https://bugcrowd.com/thirup

Follow me on:
Twitter

Recommendations and Acknowledgements

    25 September, 2017
     jesperhaun Jesper Bille Haun from Mediehuset Ingeniøren A/S:
Martin Thirup discovered an XSS vulnerability on our brand new jobsite.

Please login via Twitter to add a recommendation

Awards and Achievements


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Research Statistics



Total reports:585
Total reports on VIP sites:90
Total patched vulnerabilities:192
Total vulnerabilities on Hold (Open Bug Bounty):5
Recommendations received:1
Active since:07.07.2015
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Week

Open Bug Bounty Certificate



Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
13.08.2018
On Hold
Cross Site Scripting
13.08.2018
On Hold
Cross Site Scripting
13.08.2018
On Hold
Cross Site Scripting
13.08.2018
On Hold
Cross Site Scripting
13.08.2018
On Hold
Cross Site Scripting
04.06.2018
unpatched
Cross Site Scripting
05.03.2018
patched
Cross Site Scripting
16.01.2018
unpatched
Cross Site Scripting
15.12.2017
patched
Cross Site Scripting
14.12.2017
patched
Cross Site Scripting
05.10.2017
unpatched
Cross Site Scripting
05.10.2017
unpatched
Cross Site Scripting
05.10.2017
unpatched
Cross Site Scripting
05.10.2017
unpatched
Cross Site Scripting
05.10.2017
unpatched
Cross Site Scripting
05.10.2017
unpatched
Cross Site Scripting
05.10.2017
unpatched
Cross Site Scripting
01.10.2017
unpatched
Cross Site Scripting
01.10.2017
unpatched
Cross Site Scripting
30.09.2017
patched
Cross Site Scripting

  Latest Patched

      bergfreunde.de
    Patched on 15.10.2018
      deskgram.org
    Patched on 15.10.2018
      playboyplus.com
    Patched on 15.10.2018
      howtopronounce.com
    Patched on 15.10.2018
      timeturk.com
    Patched on 15.10.2018
      polar.com
    Patched on 15.10.2018
      firstpost.com
    Patched on 15.10.2018
      audible.com
    Patched on 14.10.2018
      bakeca.it
    Patched on 14.10.2018
      godaddy.com
    Patched on 14.10.2018

  Recent Recommendations

    15 October, 2018
     LimangoI:
Hallo Armin,
vielen Dank für die Meldung einer Sicherheitslücke auf unserem Reiseportal und für die konstruktive und proaktive Unterstützung!
Viele Grüße, Michael
    14 October, 2018
     HezMonaghan:
Super quick to reply, open and transparent. HUGE thanks to pointing out some issues!
    12 October, 2018
     chrishadley:
Diego was helpful in disclosing and providing details about an XSS vulnerability, which we have since patched. Thanks!
    11 October, 2018
     wiesenbacher:
Thank You Eduardo! I fixed the Problem on 2018/10/08. But unfortunately you forgot to switch my Status to "patched". You wrote me, you have done this. Did you found later an other security Risk?
    10 October, 2018
     whitedataDE:
Thank you for your XSS report and fast response