Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
608,127 coordinated disclosures
391,531 fixed vulnerabilities
924 bug bounties with 1,851 websites
18,741 researchers, 1198 honor badges

fakessh | Security Researcher Profile


Security researcher fakessh has already helped fix 1840 vulnerabilities.



Researcher reputation:  830

Real name:
lacroute serge

About me:
Computer expert research https://hackerone.com/lacrouteserge/ #celibataire beaufrere #josh previous #crimee now #nenuphar nasa mes publications sont anonymes
aka sergi julien

How to contact me:
by email
[email protected]
pgp
https://pastebin.com/raw/KqF20bC1

Alternative Contacts:
lacroute serge
4 bis avenue general de gaulle
64000 pau
france
33695635060

Certifications & Diplomas:
https://map.httpcs.com/author/26492
https://hackerone.com/lacrouteserge

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
paypal [email protected]
bitcoin 1MM5j6t8WBaRTwus2tBJEvegU44LU8qYnq
ether 0x1212EE17169244fcCD244Be1c6f0C3cfCfaa1D75
payoneer [email protected]
wired transfer contact m
size XXL

Halls of Fame:
boschs webmini active-campaign ebay xmarks att wiki.scn.sap.com europa.eu simplerisk.com ziprecruteur buzzfeed meetic altervista nokia thumbtack.com pivotal.io dutchdare.nl zooniverse.org

Follow me on:
Twitter
Facebook
LinkedIn

Recommendations and Acknowledgements

@coliseum555     23 January, 2020
    Twitter coliseum555 Andrei from Geo-home:
Dear fakessh, thank you for responsible disclosure of a XSS vulnerability on a site.

Best regards,
Andrei
@sbcsirt     19 November, 2019
    Twitter sbcsirt SoftBank CSIRT from SoftBank Corp.:
Dear fakessh,

Thank you for discovering the vulnerability of our website.
We were able to immediately fix this vulnerability thanks to your report.
We appreciate your kindness.

Best regards,
SoftBank CSIRT
@Tin77594360     21 October, 2019
    Twitter Tin77594360 Tin from American Water:
On behalf of our company, thank you for the accurate and quick response in disclosing our vulnerability. This was done in a professional and responsible manner through the bug bounty program, giving us time to remediate.
@tomcorder     21 October, 2019
    Twitter tomcorder Tom Corder from Emmanuel College:
Thank you fakessh for not only finding and reporting a bug on our college website but then being very helpful in helping me to reproduce the issue and then verifying it as being solved. I am very grateful.
@CsirtOu     7 October, 2019
    Twitter CsirtOu Matej Zuzcak from CSIRT OU - University of Ostrava:
Thank you for responsible disclosure of a XSS vulnerability on our web site. Thanks also for fast and friendly communication.

Matej Zuzcak
Head of CSIRT OU
University of Ostrava
@ziduniwien     2 October, 2019
    Twitter ziduniwien Zentraler Informatikdienst from University of Vienna:
Dear fakessh,
The University of Vienna would like to thank you for your valuable contribution in finding multiple website security issues.
Your input is highly welcome and helps to raise the security level of our educational institution.
Servus and greetings from Vienna, Austria.
@UUCSIRT     20 September, 2019
    Twitter UUCSIRT Security and safety dept from Uppsala university:
Thank you for your vulnerability report!
/Hans Liss, Uppsala university
@CertUC3M     13 September, 2019
    Twitter CertUC3M CSIRT at UC3M from Universidad Carlos III of Madrid:
We would like to thank Fakessh for your carefull and professionally conducted vulnerability report.

Wishing you the best

Rafael Calzada
Security Manager
Universidad Carlos III of Madrid
[email protected]
@LancasterUniSOC     10 September, 2019
    Twitter LancasterUniSOC John Couzins from Lancaster University:
Dear fakessh,
Thank you very much for your responsible and professionally conducted vulnerability report.
@_isgi_     6 September, 2019
    Twitter _isgi_ ISGI from ISGI:
Dear Fakessh,

The International Service of Geomagnetic Indices would like to thank you for your nice and valuable contribution in finding website security issue. Your message helps us to raise the security level of our international scientific service.

Best regards from Strasbourg, France,

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:5148
Total reports on VIP sites:283
Total patched vulnerabilities:1840
Recommendations received:60
Active since:14.02.2017

Open Bug Bounty Certificate


Researcher Certificate

27.05.2019  bing openredirect

bing openredirect

20.05.2019  Hitachi Incident Response Team (HIRT)

Hitachi HIRT xss reflected

Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
23.02.2020
unpatched
Cross Site Scripting
23.02.2020
patched
Cross Site Scripting
17.02.2020
unpatched
Cross Site Scripting
16.02.2020
patched
Cross Site Scripting
08.02.2020
unpatched
Cross Site Scripting
07.02.2020
unpatched
Cross Site Scripting
07.02.2020
unpatched
Cross Site Scripting
07.02.2020
unpatched
Cross Site Scripting
07.02.2020
unpatched
Cross Site Scripting
07.02.2020
unpatched
Cross Site Scripting
07.02.2020
unpatched
Cross Site Scripting
07.02.2020
unpatched
Cross Site Scripting
05.02.2020
unpatched
Cross Site Scripting
04.02.2020
unpatched
Cross Site Scripting
01.02.2020
unpatched
Cross Site Scripting
25.01.2020
unpatched
Cross Site Scripting
25.01.2020
unpatched
Cross Site Scripting
25.01.2020
unpatched
Cross Site Scripting
25.01.2020
unpatched
Cross Site Scripting
24.01.2020
unpatched
Cross Site Scripting

  Latest Patched

 26.10.2020 cancer.net
 26.10.2020 xfinity.com
 26.10.2020 vccircle.com
 25.10.2020 ranker.com
 25.10.2020 usp.br
 25.10.2020 belezanaweb.com.br
 25.10.2020 procempa.com.br
 23.10.2020 untappd.com
 23.10.2020 petmd.com
 23.10.2020 dafont.com

  Latest Blog Posts

26.10.2020 by _r00t1ng_
Bypass Addslashes using Multibyte Character
26.10.2020 by _r00t1ng_
One Payload to Inject them all - MultiQuery Injection
26.10.2020 by _r00t1ng_
Routed SQL Injection
26.10.2020 by _r00t1ng_
DIOS the SQL Injectors Weapon
26.10.2020 by p4c3n0g3
How to find AngularJS XSS

  Recent Recommendations

@rlaager     26 October, 2020
    Twitter rlaager:
Thank you for reporting a SQL injection vulnerability and making the web safer.
@mako_o9999     23 October, 2020
    Twitter mako_o9999:
Gdattacker found a XSS problem on one of our websites and reported to us. We were able to solve the problem quickly. Thank you so much!
@BizzdoD     21 October, 2020
    Twitter BizzdoD:
Many thanks to Sithu for bringing a XSS vulnerability on our site to our attention. He was very courteous in communications and helped verify that our patch solved the problem properly. Thank you Sir for helping making the Internet a safer place.
@markholt     20 October, 2020
    Twitter markholt:
Many thanks to T4rlix who helped disclose an XSS vulnerability on our website. Very good to deal with, thank you very much for reporting.
@vadus     19 October, 2020
    Twitter vadus:
Warbid helped disclose several vulnerabilities on our website. With his help, we were able to patch this issue and close up the vulnerability. Thank you very much for your help, and thank you for helping to make the web a safer place.