Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
606,629 coordinated disclosures
390,202 fixed vulnerabilities
923 bug bounties with 1,850 websites
18,720 researchers, 1197 honor badges

febin_rev | Security Researcher Profile


Security researcher febin_rev has already helped fix 19 vulnerabilities.



Researcher reputation:  110

Real name:
Febin

About me:
i am a passionate hacker, security researcher and a bug hunter

How to contact me:
E-mail: [email protected]
Phone: 91 8270920043

Alternative Contacts:
[email protected]
twitter.com/febinrev

Certifications & Diplomas:
Fortinet nse 1,2
CyberArk trustee
Networking
Linux administration
CNSS
Autopsy forensics

Experience in Application Security
1-3 years

Award / Bug Bounty I prefer:
Money , Accessories , Thanks , recommendation. Anything You like to gift me for my responsible report.


PayPal : paypal.me/febinrev

Halls of Fame:
bugcrowd.com/fitbit/hall-of-fame
bugcrowd.com/indeed/hall-of-fame
litmind.com/bughunters

Follow me on:
Twitter

Recommendations and Acknowledgements

@w3c_systeam     7 October, 2020
    Twitter w3c_systeam Systeam from W3C:
Thank you Febin for your clear and concise report and proof of concept that allowed us to close an SSRF to internal port scanning issue in one of our services.
@lorenzoherrera     16 September, 2020
    Twitter lorenzoherrera Loren from Litmind:
Febin has found many bugs in our site and helped us solving them by providing comprehensive proof of concept, screenshots and details. He earned a place of honor in our bug hunters hall of fame: https://www.litmind.com/bughunters
@lorenzoherrera     5 October, 2020
    Twitter lorenzoherrera Loren from Litmind:
Febin has found a bunch of vulnerabilities related to the lack of CSRF request authentication. Thanks to his reports our site is now more secure! Thank you!
@GoSportsa     21 September, 2020
    Twitter GoSportsa Rick from Sportsa.com:
Febin discovered that our security.txt wasn't configured correctly and pointed to an outdated page. He provided a quick message, showed the issue. Thank you!

https://sportsa.com
@wall26com     15 September, 2020
    Twitter wall26com Wall26 from Wall26:
Thanks for finding and reporting a business logic issue of our service.
@lorenzoherrera     14 September, 2020
    Twitter lorenzoherrera Loren from Photolancers:
Thanks febin_rev for your kind report! You've discovered a CSRF vulnerability in our site thanks and we've been able to solve it thanks to your help. So grateful, cheers!
@wall26com     19 August, 2020
    Twitter wall26com Wall26 from wall26:
Thank you for reporting CSRF issue of our website.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:96
Total reports on VIP sites:17
Total patched vulnerabilities:19
Total vulnerabilities on Hold (Open Bug Bounty):60
Recommendations received:7
Active since:29.06.2020

Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
07.10.2020
On Hold
Cross Site Scripting
06.10.2020
On Hold
Cross Site Scripting
04.10.2020
On Hold
Cross Site Scripting
30.09.2020
On Hold
Open Redirect
29.09.2020
On Hold
Cross Site Scripting
28.09.2020
On Hold
Cross Site Scripting
28.09.2020
On Hold
Cross Site Scripting
22.09.2020
On Hold
Cross Site Scripting
13.09.2020
On Hold
Cross Site Scripting
12.09.2020
On Hold
Open Redirect
12.09.2020
On Hold
Open Redirect
12.09.2020
On Hold
Open Redirect
12.09.2020
On Hold
Open Redirect
12.09.2020
On Hold
Open Redirect
05.09.2020
patched
Cross Site Scripting
03.09.2020
On Hold
Open Redirect
30.08.2020
patched
Cross Site Scripting
30.08.2020
On Hold
Cross Site Scripting
28.08.2020
patched
Cross Site Scripting
28.08.2020
On Hold
Cross Site Scripting

  Latest Patched

 23.10.2020 untappd.com
 23.10.2020 petmd.com
 23.10.2020 dafont.com
 23.10.2020 skylum.com
 23.10.2020 mtcom.ws
 23.10.2020 ibtimes.com
 23.10.2020 goo-net.com
 22.10.2020 totaljobs.com
 22.10.2020 gamesindustry.biz

  Latest Blog Posts

05.10.2020 by _r00t1ng_
Steal IP Address using Image
05.10.2020 by _r00t1ng_
DDOS Using SQL injection (SiDDOS)
05.10.2020 by _r00t1ng_
XSS Injection with SQLi
14.09.2020 by aninda_anon
VPS Cheatsheet for bug hunting
14.09.2020 by pk_12397
A Story of IDOR To Account Takeover

  Recent Recommendations

@mako_o9999     23 October, 2020
    Twitter mako_o9999:
Gdattacker found a XSS problem on one of our websites and reported to us. We were able to solve the problem quickly. Thank you so much!
@BizzdoD     21 October, 2020
    Twitter BizzdoD:
Many thanks to Sithu for bringing a XSS vulnerability on our site to our attention. He was very courteous in communications and helped verify that our patch solved the problem properly. Thank you Sir for helping making the Internet a safer place.
@vadus     19 October, 2020
    Twitter vadus:
Warbid helped disclose several vulnerabilities on our website. With his help, we were able to patch this issue and close up the vulnerability. Thank you very much for your help, and thank you for helping to make the web a safer place.
@pagel     18 October, 2020
    Twitter pagel:
Many thanks to cyberaz0r for pointing out a css vulnerability on our site. He was very pleasant to deal with and shared his knowledge openly.
@amswebs     16 October, 2020
    Twitter amswebs:
Thank you for your help with this XSS vulnerability. We appreciate the responsible reporting via openbugbounty.