Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 307,885 coordinated disclosures
179,529 fixed vulnerabilities
337 bug bounties with 733 websites
8,475 researchers

myoko Top Security Researcher of the Month | Security Researcher Profile


Security researcher myoko has already helped fix 758 vulnerabilities.



Researcher reputation:  200

Real name:
myoko

About me:
freelance software developer from dawei

How to contact me:
[email protected]

Alternative Contacts:
[email protected]

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
award , bounty , hof ,

Halls of Fame:
cert-EU,AT&T,dell,ncsc nl,intel,lenovo,alibaba,....

Follow me on:
Twitter

Recommendations and Acknowledgements

    14 September, 2018
     despegar_appsec Application Security from Despegar.com:
Nutronex reported a vulnerability on one of our microsites, and provided helpful information to reproduce it. It has since been fixed. We thank him for his good work and his contribution to the ethical hacking community!
    23 November, 2018
     testberichteDE Andreas S from Testberichte.de:
Hi Myo Ko, thank you very much for your information on our vulnerability! This helps us keeping our website secure.
    8 November, 2018
     MicStr81 M. Strauß from ETC Shop:
Thank you for helping us to fix our problem.
Good work!
    24 October, 2018
     SNTech2 SnTech2 from Sharenet:
Thanks for alerting us of the issue which we were able to patch. Thanks again for all your help.
    22 October, 2018
     DealNews Brian Moon from DealNews.com, Inc.:
Thanks for the XSS report. Turns out it was in a 3rd party widget. We have put some checks around what data we send to that at widget.
    10 October, 2018
     RinusSpit Rinus from Rinus Spit:
Myoko aka Nutronex, great thanx for reporting and details for a vulnerability on our website
    2 October, 2018
     astroseekcom Petr9 from Astro-Seek.com:
Myoko(nutronex) showed me several examples of XSS vulnerability and helped me to fix it. Thank you.
    5 September, 2018
     nishika99414153 Nishikant from QuestionPro:
Myoko aka nutronex, great thanks for reporting and detailed steps to reproduce the vulnerability...
    5 September, 2018
     nishika99414153 Nishikant from QuestionPro:
Myoko aka nutronex, great thanks for reporting and detailed steps to reproduce the vulnerability...
    23 August, 2018
     donovancarthew Donovan from Skoolbag:
Nutronex responded quickly with the information we needed to resolve the issues. Thanks Nutronex!

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Awards and Achievements


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Research Statistics



Total reports:1736
Total reports on VIP sites:261
Total patched vulnerabilities:758
Total vulnerabilities on Hold (Open Bug Bounty):262
Recommendations received:12
Active since:25.03.2018
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate



Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
14.12.2018
On Hold
Cross Site Scripting
12.12.2018
On Hold
Cross Site Scripting
12.12.2018
On Hold
Cross Site Scripting
12.12.2018
patched
Cross Site Scripting
12.12.2018
patched
Cross Site Scripting
12.12.2018
On Hold
Cross Site Scripting
11.12.2018
patched
Cross Site Scripting
11.12.2018
patched
Cross Site Scripting
11.12.2018
patched
Cross Site Scripting
11.12.2018
patched
Cross Site Scripting
11.12.2018
patched
Cross Site Scripting
11.12.2018
patched
Cross Site Scripting
11.12.2018
patched
Cross Site Scripting
11.12.2018
patched
Cross Site Scripting
11.12.2018
patched
Cross Site Scripting
11.12.2018
patched
Cross Site Scripting
11.12.2018
patched
Cross Site Scripting
11.12.2018
On Hold
Cross Site Scripting
11.12.2018
On Hold
Cross Site Scripting
10.12.2018
patched
Cross Site Scripting

  Latest Patched

      paginebianche.it
    Patched on 22.01.2019
      haozu.com
    Patched on 22.01.2019
      realtor.com
    Patched on 22.01.2019
      bloomberg.com
    Patched on 22.01.2019
      careerone.com.au
    Patched on 22.01.2019
      yourtango.com
    Patched on 22.01.2019
      ramtrucks.com
    Patched on 22.01.2019
      chrysler.com
    Patched on 22.01.2019
      iasj.net
    Patched on 22.01.2019
      ubisoft.com
    Patched on 22.01.2019

  Recent Recommendations

    22 January, 2019
     Majestic:
Following Felipe's disclosure, we have now fixed the Reflected Cross-Site Scripting web vulnerability you discovered in our "www.majestic12.co.uk" web-application. We'd like to thank Felipe for his prompt and professional disclosure.
    22 January, 2019
     kkonzentrat:
Armin found an XSS bug in our product and was nice and supportive to help us in dealing with the vulnerability. We were able to release an update just a few hours after discovery.

Thank you so much Armin for making the web a better place!
    22 January, 2019
     DJB31st:
Found a xss issue, quickly emailed with the affected pages and links to aid resolving. Many thanks
    21 January, 2019
     Grnland3:
Guten Tag Armin

Besten Dank für Ihre Mail und die Dokumentation der eruierten XXS-Schwachstelle. Wir sind in einem laufenden Prozess daran Schwachstellen, wie die von Ihnen Identifizierte, zu eruieren und zu beheben.
Die Sensibilisierung der Entwickler zur Verhinderung von Sicherheitslücken bedarf offenbar weiterer Schritte, für Ihr professionelles Vorgehen und den Hinweis möchten wir uns bedanken.

Grüsse
Eisbär
    21 January, 2019
     viewbug:
Awesome recommendations to help the site have less vulnerabilities. Thank you again for your support!