Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
542,517 coordinated disclosures
348,655 fixed vulnerabilities
818 bug bounties with 1,596 websites
16,741 researchers, 1134 honor badges

drok3r | Security Researcher Profile


Security researcher drok3r has already helped fix 244 vulnerabilities.



Researcher reputation:  20

Real name:
Julio Augusto Rangel Medina

About me:
consultant in computer security, researcher in Web security and data collection. founder of RedBird and member of different organizations and companies focused on computer security. #RedBird #OIPCC

How to contact me:
[email protected]
[email protected]

Experience in Application Security
1-3 years

Award / Bug Bounty I prefer:
My PayPal account: paypal.me/drok3r
You can donate me 5, 10, 15, 20, 50, 100 dlls or whatever you like.
Help me buy more coffee and coke or give me a recommendation :3

Follow me on:
Twitter
Facebook

Recommendations and Acknowledgements

    15 September, 2019
     dusalnet Almas from Dusal:
Thank you for find vulnerability for my site.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:752
Total reports on VIP sites:6
Total patched vulnerabilities:244
Total vulnerabilities on Hold (Open Bug Bounty):8
Recommendations received:1
Active since:15.10.2017

Open Bug Bounty Certificate



13.09.2019  Collection of information | Google Hacking and Dorks basic

Find the login panel
site: objective.com inurl: admin | administrator | adm | login | l0gin | wp-login

SQL INJECTION
site: target.com intext: "sql syntax near" or "syntax error has occurred" or "incorrect syntax near" or "unexpected end of SQL command" or "Warning: mysql_connect ()" or "Warning: mysql_query ()" or "Warning: pg_connect ()" or "Warning: mysql_fetch_array ()"

site: target.com intext: "sql syntax near" or
"syntax error has occurred"
"incorrect syntax near"
"unexpected end of SQL command"
"Warning: mysql_connect ()"
"Warning: mysql_query ()"
"Warning: pg_connect ()"
"Warning: mysql_fetch_array ()"
"MySQL Query Failed"

20.02.2019  ModSecurity - ByPass XSS


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
28.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
19.03.2020
unpatched
Improper Access Control 
19.03.2020
unpatched
Improper Access Control 
19.03.2020
unpatched
Improper Access Control 
19.03.2020
unpatched
Improper Access Control 
19.03.2020
unpatched
Improper Access Control 
19.03.2020
unpatched
Improper Access Control 
19.03.2020
unpatched
Improper Access Control 
19.03.2020
unpatched
Cross Site Scripting
16.02.2020
unpatched
Cross Site Scripting
16.02.2020
unpatched
Cross Site Scripting
16.02.2020
unpatched
Cross Site Scripting
16.02.2020
unpatched
Cross Site Scripting

  Latest Patched

 10.07.2020 dotdigital.com
 10.07.2020 pearltrees.com
 10.07.2020 milligazete.com.tr
 10.07.2020 reuters.com
 10.07.2020 groupon.com
 10.07.2020 edeka.de
 10.07.2020 as-1.co.jp
 10.07.2020 scad.edu
 10.07.2020 nodis3.gsfc.nasa.gov
 09.07.2020 plagscan.com

  Latest Blog Posts

24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs & Security Vulnerabilities | Bug Bounty Tutorials 2020
24.06.2020 by 0xcrypto
Improper Access Control - Generic: Unrestricted access to any "connected pack" on docs in coda.io
04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports

  Recent Recommendations

    10 July, 2020
     Cajun_Lyrics:
Thank you very much for letting me know about the vulnerabilities on my website, It is really appreciated!
    10 July, 2020
     SNTech2:
A big thanks for notifying us of the bug! Much appreciated.
    9 July, 2020
     newstroll_de:
Thanks for reporting the bug in a very professional manner. We appreciate your work that helps us making our service more secure.
    9 July, 2020
     MariStep2:
Great job! :) Thank you for searching for vulnerabilities on our site. Very responsive, attentive and responsible Security Researcher.
    8 July, 2020
     ziduniwien:
Dear Tanzil,

The University of Vienna would like to thank you for your valuable contribution in finding multiple website security issues.
Your input is highly welcome and helps to raise the security level of our educational institution.

Servus and greetings from Vienna, Austria.