Open Bug Bounty selected among the
Top 5 Bug Bounty programs to watch
in 2021 by The Hacker News

For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,099,526 coordinated disclosures
669,747 fixed vulnerabilities
1,436 bug bounty programs, 2,860 websites
25,150 researchers, 1,374 honor badges

badcons2002 | Security Researcher Profile


Security researcher badcons2002 has already helped fix 10 vulnerabilities.



Researcher reputation:  0

Real name:
Daniel Carlos de Carvalho

About me:
Pentest em SOs, Segurana Digital Corporativo, Segurana de Aplicaes Web, Pedagogo e Professor. Caador de recompensas na web. Programador Python

Contact email:
[email protected]

Alternative Contacts:
55 88996909546

Certifications & Diplomas:
Pedagogo
Processamento de Dados
Pentest em SOs
Segurana em Aplicaes web
Seg Digital Corpor

Experience in Application Security
< 1 year

Award / Bug Bounty I prefer:
Brindes
Cursos
Viagens
dinheiro
# Bug Bounty ($$$)
# Hall Of Fame
# T-shirts, Sweats, Caps, Stickers, Keychains, etc

Follow me on:
Twitter
Facebook
LinkedIn

Recommendations and Acknowledgements

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:24
Total reports on VIP sites:6
Total patched vulnerabilities:10
Total vulnerabilities on Hold (Open Bug Bounty):8
Active since:11.05.2021

Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions




No posts in blog yet










  Latest Patched

 19.10.2021 picuki.com
 19.10.2021 filmdaily.co
 19.10.2021 fileforum.com
 19.10.2021 domain.com
 19.10.2021 aafaf.pr.gov
 19.10.2021 bioguayas.braining.ws
 18.10.2021 elsoldemexico.com.mx

  Latest Blog Posts

08.10.2021 by NNeuchi
How I Found My First Bug Reflected Xss On PIA.GOV.PH(Philippine Information Agency)
26.08.2021 by PyaePhyoThu98
eG Manager v7.1.2: Improper Access Control lead to Remote Code Execution (CVE-2020-8591)
14.07.2021 by Open Bug Bounty
Interview With Open Bug Bounty
25.05.2021 by 0xrocky
Google XSS Game
25.05.2021 by ShivanshMalik12
Testing for XSS (Cross Site Scripting)

  Recent Recommendations

@xnih     18 October, 2021
    Twitter xnih:
Thanks to mistry4592 for his report and extra feedback on the issue. He was quick to provide us a link to reproduce the issue when asked!
@abulte     15 October, 2021
    Twitter abulte:
JlsPentest has responsibly disclosed a confirmed vulnerability. It had already been patched on our latest dev build but we still appreciated the report and the professional way it has been handled.
@vinitbhoir543     15 October, 2021
    Twitter vinitbhoir543:
Our team would like to thank you for finding vulnerability on our website.
@kitcert     14 October, 2021
    Twitter kitcert:
KIT-CERT would like to thank Tanzil Khan for responsibly disclosing an XSS-Vulnerability on one of our departments websites and offering the time required to fix the issue!
@diogenesverlag     13 October, 2021
    Twitter diogenesverlag:
Thanks a lot for reporting this bug and thus making our site more secure.