Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
611,515 coordinated disclosures
393,125 fixed vulnerabilities
928 bug bounties with 1,860 websites
18,805 researchers, 1199 honor badges

keritzy | Security Researcher Profile


Security researcher keritzy has already helped fix 2027 vulnerabilities.



Researcher reputation:  40

Real name:
Steven Hampton

About me:
Independent Security Researcher // Programmer.

I hunt for people vulnerabilities and find securities flaws that needed to be reported as soon as possible that could be on major risks. I don't want to break or damage system. The reports that ive done in list with a Hall of fames, gifts and thank you email is a process of myself to reputate.

Others:
https://hackerone.com/keritz
https://bugcrowd.com/Keritzy

How to contact me:
[email protected]
https://stevenh.neocities.org/

Alternative Contacts:
Email:[email protected]
https://keybase.io/keritzy
Donate me cash: https://www.paypal.me/keritzy

Certifications & Diplomas:
I buy books also training in real scenario to develop my security skills :)

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
Send cash into BTC Wallet:1FryK8pJo9KmTo4nvtnVFRMkxMQKgyNpR9
Paypal
Depend on Bounty 5$ - 500$
Swags
Public Recommendation
Offer of collaboration / Internship
Hall of Fame
Acknowledgement

Halls of Fame:
EU
Dutch Telekom
Sony
Hostinger
United Depart of Defense
Infogram
more

Follow me on:
Twitter
Facebook
LinkedIn

Recommendations and Acknowledgements

@KlausSchmi     6 January, 2018
    Twitter KlausSchmi Klaus Schmidinger from TVDR:
Thank you, Keritzy, for reporting and helping to resolve an XSS vulnerability in a script on my web server!
@jason_purdy     30 November, 2017
    Twitter jason_purdy Jason Purdy from Fine Books & Collections:
Keritzy helped identify an XSS vulnerability with some legacy code. Thanks!
@MohammedBellifa     28 November, 2017
    Twitter MohammedBellifa Mohammed Bellifa from University of Denver Sturm College of Law:
Keritzy was very helpful in helping us identify and resolve an XSS vulnerability.
@mgrnwd     30 October, 2017
    Twitter mgrnwd Matthew Greenwood from University of Washington:
Thanks for your help in finding a department web server vulnerability!

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:5670
Total reports on VIP sites:409
Total patched vulnerabilities:2027
Total vulnerabilities on Hold (Open Bug Bounty):70
Recommendations received:4
Active since:24.04.2017
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Week

Open Bug Bounty Certificate


Researcher Certificate



No posts in blog yet


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
26.10.2020
On Hold
Cross Site Scripting
26.10.2020
On Hold
Cross Site Scripting
26.10.2020
On Hold
Cross Site Scripting
26.10.2020
On Hold
Cross Site Scripting
26.10.2020
On Hold
Cross Site Scripting
26.10.2020
On Hold
Cross Site Scripting
26.10.2020
On Hold
Cross Site Scripting
26.10.2020
On Hold
Open Redirect
26.10.2020
On Hold
Cross Site Scripting
26.10.2020
On Hold
Cross Site Scripting
26.10.2020
On Hold
Cross Site Scripting
25.10.2020
On Hold
Cross Site Scripting
25.10.2020
On Hold
Cross Site Scripting
25.10.2020
On Hold
Cross Site Scripting
25.10.2020
On Hold
Cross Site Scripting
25.10.2020
On Hold
Cross Site Scripting
25.10.2020
On Hold
Cross Site Scripting
25.10.2020
On Hold
Cross Site Scripting
25.10.2020
On Hold
Cross Site Scripting
25.10.2020
On Hold
Cross Site Scripting

  Latest Patched

 29.10.2020 istockphoto.com
 29.10.2020 skin.gs
 28.10.2020 plos.org
 28.10.2020 audiusa.com
 28.10.2020 um.es
 28.10.2020 bpjs-kesehatan.go.id
 28.10.2020 dooda.me
 28.10.2020 inews.id
 28.10.2020 faz.net
 27.10.2020 dek-d.com

  Latest Blog Posts

26.10.2020 by _r00t1ng_
Bypass Addslashes using Multibyte Character
26.10.2020 by _r00t1ng_
One Payload to Inject them all - MultiQuery Injection
26.10.2020 by _r00t1ng_
Routed SQL Injection
26.10.2020 by _r00t1ng_
DIOS the SQL Injectors Weapon
26.10.2020 by p4c3n0g3
How to find AngularJS XSS

  Recent Recommendations

@MizoueShumpei     29 October, 2020
    Twitter MizoueShumpei:
Thank you very much for your help.
@adridder     28 October, 2020
    Twitter adridder:
Thank you for your help with this XSS vulnerability on our site. We appreciate the responsible reporting via openbugbounty.
@gaborvitez     28 October, 2020
    Twitter gaborvitez:
Ajaysen R found a reflected cross site scripting bug in one of our cgi scripts, this way he helped us improve the security of our website. He was really fast to react, working with him was really a pleasure. We are grateful for the issues he made us aware of.
@Jobe1986     28 October, 2020
    Twitter Jobe1986:
Thank you for your efforts and reporting the XSS vulnerability you found on my website.
@TConfetti     28 October, 2020
    Twitter TConfetti:
Vighnesh Gupta was responsive and professional in helping us remediate a bug on our website. Thank you for your insight, Vighnesh.