Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
613,375 coordinated disclosures
393,516 fixed vulnerabilities
929 bug bounties with 1,869 websites
18,823 researchers, 1199 honor badges

febin_rev | Security Researcher Profile


Security researcher febin_rev has already helped fix 20 vulnerabilities.



Researcher reputation:  110

Real name:
Febin

About me:
i am a passionate hacker, security researcher and a bug hunter

How to contact me:
E-mail: [email protected]
Phone: 91 8270920043

Alternative Contacts:
[email protected]
twitter.com/febinrev

Certifications & Diplomas:
Fortinet nse 1,2
CyberArk trustee
Networking
Linux administration
CNSS
Autopsy forensics

Experience in Application Security
1-3 years

Award / Bug Bounty I prefer:
Money , Accessories , Thanks , recommendation. Anything You like to gift me for my responsible report.


PayPal : paypal.me/febinrev

Halls of Fame:
bugcrowd.com/fitbit/hall-of-fame
bugcrowd.com/indeed/hall-of-fame
litmind.com/bughunters

Follow me on:
Twitter

Recommendations and Acknowledgements

@w3c_systeam     7 October, 2020
    Twitter w3c_systeam Systeam from W3C:
Thank you Febin for your clear and concise report and proof of concept that allowed us to close an SSRF to internal port scanning issue in one of our services.
@lorenzoherrera     16 September, 2020
    Twitter lorenzoherrera Loren from Litmind:
Febin has found many bugs in our site and helped us solving them by providing comprehensive proof of concept, screenshots and details. He earned a place of honor in our bug hunters hall of fame: https://www.litmind.com/bughunters
@lorenzoherrera     5 October, 2020
    Twitter lorenzoherrera Loren from Litmind:
Febin has found a bunch of vulnerabilities related to the lack of CSRF request authentication. Thanks to his reports our site is now more secure! Thank you!
@GoSportsa     21 September, 2020
    Twitter GoSportsa Rick from Sportsa.com:
Febin discovered that our security.txt wasn't configured correctly and pointed to an outdated page. He provided a quick message, showed the issue. Thank you!

https://sportsa.com
@wall26com     15 September, 2020
    Twitter wall26com Wall26 from Wall26:
Thanks for finding and reporting a business logic issue of our service.
@lorenzoherrera     14 September, 2020
    Twitter lorenzoherrera Loren from Photolancers:
Thanks febin_rev for your kind report! You've discovered a CSRF vulnerability in our site thanks and we've been able to solve it thanks to your help. So grateful, cheers!
@wall26com     19 August, 2020
    Twitter wall26com Wall26 from wall26:
Thank you for reporting CSRF issue of our website.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:96
Total reports on VIP sites:17
Total patched vulnerabilities:20
Total vulnerabilities on Hold (Open Bug Bounty):56
Recommendations received:7
Active since:29.06.2020

Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
07.10.2020
On Hold
Cross Site Scripting
06.10.2020
On Hold
Cross Site Scripting
04.10.2020
On Hold
Cross Site Scripting
30.09.2020
On Hold
Open Redirect
29.09.2020
On Hold
Cross Site Scripting
28.09.2020
On Hold
Cross Site Scripting
28.09.2020
On Hold
Cross Site Scripting
22.09.2020
On Hold
Cross Site Scripting
13.09.2020
On Hold
Cross Site Scripting
12.09.2020
On Hold
Open Redirect
12.09.2020
On Hold
Open Redirect
12.09.2020
On Hold
Open Redirect
12.09.2020
On Hold
Open Redirect
12.09.2020
On Hold
Open Redirect
05.09.2020
patched
Cross Site Scripting
03.09.2020
On Hold
Open Redirect
30.08.2020
patched
Cross Site Scripting
30.08.2020
On Hold
Cross Site Scripting
28.08.2020
patched
Cross Site Scripting
28.08.2020
On Hold
Cross Site Scripting

  Latest Patched

 31.10.2020 huduser.gov
 30.10.2020 prensa-latina.cu
 30.10.2020 dek-d.com
 30.10.2020 123rf.com
 30.10.2020 t3n.de
 30.10.2020 489pro.com
 30.10.2020 dgtle.com
 29.10.2020 photobucket.com
 29.10.2020 istockphoto.com
 29.10.2020 skin.gs

  Latest Blog Posts

26.10.2020 by _r00t1ng_
Bypass Addslashes using Multibyte Character
26.10.2020 by _r00t1ng_
One Payload to Inject them all - MultiQuery Injection
26.10.2020 by _r00t1ng_
Routed SQL Injection
26.10.2020 by _r00t1ng_
DIOS the SQL Injectors Weapon
26.10.2020 by p4c3n0g3
How to find AngularJS XSS

  Recent Recommendations

@benskiddle     30 October, 2020
    Twitter benskiddle:
Great disclosure of an SQL injection bug with good details to replicate the issue. Thank you.
@MizoueShumpei     29 October, 2020
    Twitter MizoueShumpei:
Thank you very much for your help.
@adridder     28 October, 2020
    Twitter adridder:
Thank you for your help with this XSS vulnerability on our site. We appreciate the responsible reporting via openbugbounty.
@gaborvitez     28 October, 2020
    Twitter gaborvitez:
Ajaysen R found a reflected cross site scripting bug in one of our cgi scripts, this way he helped us improve the security of our website. He was really fast to react, working with him was really a pleasure. We are grateful for the issues he made us aware of.
@Jobe1986     28 October, 2020
    Twitter Jobe1986:
Thank you for your efforts and reporting the XSS vulnerability you found on my website.