Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
732,717 coordinated disclosures
435,643 fixed vulnerabilities
1140 bug bounties with 2,190 websites
20,542 researchers, 1255 honor badges

mominroaimTop-50 VIP Open Redirect Reporter Top Security Researcher of the Month | Security Researcher Profile


Security researcher mominroaim has already helped fix 83 vulnerabilities.



Researcher reputation:  50

Real name:
Roaim Feroz Momin

How to contact me:
My Mobile No:- 91 9588620172

Email Address:- [email protected]

Alternative Contacts:
Email Address:- [email protected]
[email protected]

Certifications & Diplomas:
Certified Ethical Hacker (CEH)

Certified Penetration Testing Engineer (CPTE)

Experience in Application Security
1-3 years

Award / Bug Bounty I prefer:
Any awards you wish to give me will motivate me in continuing to report bugs to various organizations. You can contact me direct on [email protected] $$$ Paypal,vouchers,..etc

Follow me on:
Twitter
Facebook
LinkedIn

Recommendations and Acknowledgements

@Zachari80027226     27 June, 2020
    Twitter Zachari80027226 Zachari from Domhnall from GoConqr::
Thanks to Roaim for identifying a potential vulnerability with our site. The responsibility and transparency of the disclosure was laudable, and greatly appreciated.
Many thanks
@Calbin84784599     27 June, 2020
    Twitter Calbin84784599 Calbin from mixable from mixable::
Thank you for finding the issue and for the informative responsible disclosure - and the provided information was clear enough that we knew exactly where/how to fix the issue, so this was helpful toward making our sites more robust. Thanks !
@Aaron89316161     27 June, 2020
    Twitter Aaron89316161 Aaron from kidaxa from 3mailapp:
Thanks for reporting server debug information vulnerability on our website. We have patched it. Thanks once again
@MominNumaan     28 June, 2020
    Twitter MominNumaan Matthew from Cyburg:
I would like to thank Roaim Momin for his responsible disclosure of a XSS vulnerability. He provided us with sufficient detail to find the root cause and start working towards remediation. Keep up the good work
@Calbin84784599     27 June, 2020
    Twitter Calbin84784599 Calbin from mixable from mixable::
Thank you for finding the issue and for the informative responsible disclosure - and the provided information was clear enough that we knew exactly where/how to fix the issue, so this was helpful toward making our sites more robust. Thanks !

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:436
Total reports on VIP sites:84
Total patched vulnerabilities:83
Recommendations received:5
Active since:20.03.2019
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week

Open Bug Bounty Certificate


Researcher Certificate



No posts in blog yet


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

  Latest Patched

 15.01.2021 klerk.ru
 14.01.2021 engineering.com
 14.01.2021 qiqu.me
 14.01.2021 mettl.com
 14.01.2021 medion.com
 14.01.2021 universal.at
 14.01.2021 skillshare.com
 14.01.2021 webnots.com
 14.01.2021 bullguard.com
 14.01.2021 mnogomebeli.com

  Latest Blog Posts

25.12.2020 by _Y000_
How to bypass mod_security (WAF)
10.12.2020 by _Y000_
sql injection to bypass Mod_Security
10.12.2020 by _Y000_
Create encoded sql payloads
26.10.2020 by _r00t1ng_
Bypass Addslashes using Multibyte Character
26.10.2020 by _r00t1ng_
One Payload to Inject them all - MultiQuery Injection

  Recent Recommendations

@smiteworks     15 January, 2021
    Twitter smiteworks:
Rajesh was very helpful in providing information and penetration testing on our site. With this information, we were able to harden our infrastructure.
@matrixrewriter     15 January, 2021
    Twitter matrixrewriter:
We had no idea that this vulnerability existed in many PHP-based websites and you kindly reported it to us. Thanks for your help and all the best for your career!
@JoseLev41970568     14 January, 2021
    Twitter JoseLev41970568:
Specialist in web application penetration tester, student and passionate about computer security and ethical hacking.
@far00t1     14 January, 2021
    Twitter far00t1:
i recommend jose luis for his work and enthusiasm in helping us with our technological infrastructure.
@lorenzoherrera     14 January, 2021
    Twitter lorenzoherrera:
Raajesh reported us a nasty vulnerability that totally slipped through our radars, we didn't even know that was possible! Thanks to him and his thorough report we've been able to solve it and now our site is more secure! Thank you for your time and effor, Rajeesh!