Infosec Institute

Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute

The Hacker News

Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News

Platform update: please use our new authentication mechanism to securely use the Open Bug Bounty Platform.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,706,810 coordinated disclosures
1,384,306 fixed vulnerabilities
1,992 bug bounty programs, 3,887 websites
47,324 researchers, 1,654 honor badges

ELProfesorTop-50 VIP Open Redirect Reporter Top Security Researcher of the Month | Security Researcher Profile


Security researcher ELProfesor has already helped fix 4091 vulnerabilities.



Researcher reputation:  2130

Real name:
Taha

About me:
Our Democracy has been Hacked ! F**K society

Contact email:
[email protected]

Alternative Contacts:
[email protected]

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
I prefer :
- Rewards
- Benefits Gifts
- Swag
- PayPal Money


Anything that you wish to award me will motivate me to continue doing what I'm doing

Recommendations and Acknowledgements | Full List:

@seminardd     5 December, 2022
    Twitter seminardd Andy K. from SeminarDD:
Thank you for reporting the bug.
@skyynet_de     28 September, 2022
    Twitter skyynet_de Ingo from skyynet:
Taha identified an XSS vulnerability on our site which could be fixed fast. Thanks for the provided information!
@ThomasDBending     31 July, 2022
    Twitter ThomasDBending Thomas Bending from Thomas Bending:
Thank you for finding an XSS vulnerability in my website.
@chrisbeach     27 November, 2021
    Twitter chrisbeach Chris Beach from caption.me:
Thanks very much for reporting a bug in my website
@Gordi_OldGames     10 September, 2021
    Twitter Gordi_OldGames Gordi from Old-Games:
Thank you very much for reporting a vulnerability in our website!
@LOVD     9 July, 2021
    Twitter LOVD Ivo Fokkema from LOVD:
Thanks to ELProfesor, who found and reported two XSS vulnerabilities on our website so we could fix them!
@darione90     13 June, 2021
    Twitter darione90 Dario from Società Astronomica G.V. Schiaparelli:
Many thanks for helping us fixing a XSS vulnerability on our website!
@infoclimat     10 June, 2021
    Twitter infoclimat Frederic A from Infoclimat:
Taha has found several XSS vulnerabilities, and kindly reported them to our team.
@xss2021     27 May, 2021
    Twitter xss2021 Admin from FVB:
Taha found a XSS vulnerability on our website and acted ethically by reporting it to us, as well as providing the information we needed to reproduce the issue. Thank you for pointing this out!
@Dave48553118     19 May, 2021
    Twitter Dave48553118 Dave from ABC:
Taha let us know about an XSS vulnerability on our site which is now fixed. Thanks
@bjdean     19 May, 2021
    Twitter bjdean bjdean from Home_co_uk:
Thanks for a report which helped us improve the security of our website.
@studentdoctor     17 May, 2021
    Twitter studentdoctor Lee from studentdoctor.net:
Taha identified an XSS vulnerability on our site. We were able to patch and test it with his help. Excellent response and assistance. Thanks!
@UUCSIRT     6 May, 2021
    Twitter UUCSIRT Hans Liss from Uppsala university:
Thank you very much for responsible disclosure of an XSS problem with our website!
@NathyliciousBe     7 April, 2021
    Twitter NathyliciousBe Nat from Nat:
Thank you for reporting XSS vulnerability on my website.
@Gordi_OldGames     10 March, 2021
    Twitter Gordi_OldGames Gordi from Old-Games:
Thank you very much for reporting a vulnerability in our website!
@_mrjd0g_     4 March, 2021
    Twitter _mrjd0g_ Jason :
Thank you for the report and responding so quickly to our request for more information, it helped us track the issue down and fix it. Appreciate the work you do.
@WilliSchmid     11 February, 2021
    Twitter WilliSchmid Willi Schmid from meteoradar gmbh:
A lot of thanks to ElProfesor for his fast and precise hint to our XSS vulnerability.
@QuetteRene     7 January, 2021
    Twitter QuetteRene Security Team from Xsalto:
Merci de votre implication dans la sécurisation du site.
Votre intervention a été utile et appréciée.
@s_leitner     1 December, 2020
    Twitter s_leitner Sebastian Leitner from 24h-Pflege-Check.de:
Thanks Taha for finding the XSS issue with our site. Highly appreciated! We we able to fix it right away
@lorenzoherrera     9 October, 2020
    Twitter lorenzoherrera Loren from Litmind:
Thanks again for helping us make our site more secure! ElProfesor found a tricky reflected XSS bug in our login page, and now deserves a place (another one!) in our Hall of Fame: https://www.litmind.com/bughunters
@jshrc     7 October, 2020
    Twitter jshrc Josh Rice from UNL-CCFL:
Thanks for responsibly reporting the vulnerability and quick responses!
@_r00t1ng_     7 October, 2020
    Twitter _r00t1ng_ Thomza from Muller:
Thanks
@lorenzoherrera     16 September, 2020
    Twitter lorenzoherrera Loren from Litmind:
Taha found a tricky XSS vulnerability in our site so we were able to identify it and patch it ASAP. So much thanks! Now he's part of our bug hunters hall of fame: https://www.litmind.com/bughunters
@notedekd     11 September, 2020
    Twitter notedekd Waroros from Dek-D:
Thank you for reporting XSS vulnerability on my website.
@rundumsbaby     4 September, 2020
    Twitter rundumsbaby rundumsbaby from rundumsbaby:
Thank you very much for the report. We appreciate it!
@booksprice     3 July, 2020
    Twitter booksprice Doron from Booksprice:
I can highly recommend working with Taha!
He really helped us to understand the issue.
@zaikoio     17 June, 2020
    Twitter zaikoio Zaiko from Zaiko:
Taha, thank you for your report and the excellent work!
@PaulMar23292621     19 May, 2020
    Twitter PaulMar23292621 RD@A1 from A1 Telekom Austria:
Hey Taha!
Thank you very much for reporting the XSS issue to us. It should be resolved now. We don't have a hall of fame on your website yet, but I'll make sure you are on there once it arrives.
Thanks and all the best,
RD@A1
@AnimeCons     18 May, 2020
    Twitter AnimeCons Patrick from FanCons:
Found an XSS issue we had open. Very helpful info!
@rundumsbaby     13 May, 2020
    Twitter rundumsbaby rundumsbaby from rundumsbaby:
Thank you very much for reporting the XSS vulnerability and your quick response.
@Hansaplastique     12 May, 2020
    Twitter Hansaplastique Hansaplastique from www.weethet.nl:
Taha found another well hidden vulnerability, with some good instructions on how to reproduce the issue. Highly recommended!
Thanks again Taha and keep up the good work!
@seedfinder     6 May, 2020
    Twitter seedfinder j.a. from seedfinder:
Thanks a lot for the info about that bugs! Shit happens - but luckily there are people like ELProfesor who are here to help us lazy developers to get our stuff fixed :) Thanks again man!
@easyeieio     5 May, 2020
    Twitter easyeieio Ian from UKCS:
Thank you for pointing out the XSS vulnerability, and your quick reply to let us know where it was.
@MPDL     20 April, 2020
    Twitter MPDL Ben from MPDL:
Thank you very much for finding the bug on our website and your responsible disclosure. Absolutely appreciated. You make the web a better place!
@Hansaplastique     10 April, 2020
    Twitter Hansaplastique Hansaplastique from www.weethet.nl:
I can highly recommend working with Taha!
He's knowledgable, very responsive and provides clear information and examples, which helped me resolved the issues.
@Hansaplastique     8 April, 2020
    Twitter Hansaplastique Hans from www.weethet.nl:
I can highly recommend working with ELProfesor.
He's knowledgable, very responsive and provides clear information and examples, which helped me resolved the issues.
@KyleGeorgeArch     26 March, 2020
    Twitter KyleGeorgeArch Kyle Arch from Learning Pool:
Thank you ElProfesor for responsibly disclosing an XSS issue and providing the reproduction steps. With your help we've identified the issue and are working on a fix. Thank you for your hard work and responsible practices.
@GColsoul     10 March, 2020
    Twitter GColsoul Guy from Ineo:
Thank you for your vigilance. It helps us to improve continuously our systems. Very helpful.
@RuncornLinnets     10 March, 2020
    Twitter RuncornLinnets Steve Pritchard from Runcorn Linnets FC:
Taha found a particularly tricky XSS problem on our site, and responsibly reported it to us so we could correct the issue. We thank him for his responsible disclosure and hard work bringing security flaws like this to our attention.
@IT_Wolve     9 March, 2020
    Twitter IT_Wolve Markus from Pepperl+Fuchs AG:
Thank you Taha for reporting and helping us finding these XSS issues on our website. We fixed it.
@bigwavedave_ca     16 February, 2020
    Twitter bigwavedave_ca DaveB from bwd:
Thank you Taha for finding and reporting the vulnerability on my website.
@searacom     3 February, 2020
    Twitter searacom Pedro Marques from Seara:
ElProfesor, thanks for reporting the XSS vuln, the quick reply and clear message that led us to the right correction. Great job!
@vavideode     3 February, 2020
    Twitter vavideode Vavideo from Vavideo:
Thank you very much for making suggestions about security vulnerabilities!
@SecuriteInfoCom     30 January, 2020
    Twitter SecuriteInfoCom Arnaud Jacques from Securiteinfo.com:
Thank you for your report. It is now fixed.
@Travelmath     29 January, 2020
    Twitter Travelmath John from Travelmath:
Great job finding a vulnerability that others missed. I have fixed the issue now, thanks for your help.
@daZwiafl     28 January, 2020
    Twitter daZwiafl dazwiafl from Meramo Verlag GmbH:
Very responsive and provided clear information about what they had found.
@fredentoft     28 January, 2020
    Twitter fredentoft Fredrik :
Thank you for alerting us to a XSS vulnerability found on our site.
Very professional and helpful input!
@sandrabouw     31 December, 2019
    Twitter sandrabouw Sandra from SBO:
Thanks a lot for reporting the issue and your kind emails. Best wishes for 2020!
@sandipkar44     23 December, 2019
    Twitter sandipkar44 Sandip Kar from Learnpick Technologies Inc:
Thank you for your support to identify the error ij our location changer feature. Really helpful.
@FelixC13036006     23 December, 2019
    Twitter FelixC13036006 Felix from Ziua.ro:
Great work uncovering the flaw and very quick response with all the details! Thank you very very much for making the Internet a safer place. Keep up the great work!
@Buchabstauber     6 December, 2019
    Twitter Buchabstauber OJS Team from UNIVIE:
We would like to thank you for your valuable contribution in finding the XSS issue on our site! You have been very helpful!
@ziduniwien     3 December, 2019
    Twitter ziduniwien Zentraler Informatikdienst from University of Vienna:
Dear ELProfesor,

The University of Vienna would like to thank you for your valuable contribution in finding a website security issue. Your input is highly welcome and helps to raise the security level of our educational institution.

Servus and greetings from Vienna, Austria.
@nomuthetart     21 November, 2019
    Twitter nomuthetart nab8 from ESS@UW:
Very responsive and provided clear information about what they had found.
@fislerdata     11 November, 2019
    Twitter fislerdata fislerdata from fislerdata:
Thank you for the assistance. Clearly stated issue, clear report. Thank you for your work
@BDUe_Fachverlag     28 October, 2019
    Twitter BDUe_Fachverlag Nadine from BDÜ Fachverlag:
Helpful information and report. We appreciate the quick feedback.
Thanks!
@r_c_claxton     1 October, 2019
    Twitter r_c_claxton Richard :
Thank you for identifying a vulnerability on our site!
@ashleyhindle     20 September, 2019
    Twitter ashleyhindle Ashley from C&C:
Thank you so much for highlighting the vulnerability, it really helped!
@ziduniwien     11 September, 2019
    Twitter ziduniwien Computer Center from University of Vienna:
Dear ELProfesor,

The University of Vienna would like to thank you for your valuable contribution in finding a website security issue. Your input is highly welcome and helps to raise the security level of our educational institution.

Servus and greetings from Vienna, Austria.
@JamieForster     10 September, 2019
    Twitter JamieForster JamieEff :
Thank you so much for highlighting the vulnerability - you're doing an amazing job!
@dusalnet     7 September, 2019
    Twitter dusalnet Blogmn.net from Blogmn.net:
Thank you for identifying the XSS issue on my site! You have been very helpful!
@fisher_of_men11     6 September, 2019
    Twitter fisher_of_men11 Andy from Mudconnector:
Thank you for identifying the XSS issue on my site! You have been very helpful!
@AndyTrier     4 September, 2019
    Twitter AndyTrier Andreas from KV Trier-Saarburg:
Thanks for help fixing issues.
Fast communication he make a good job.
@dsmithgard     3 September, 2019
    Twitter dsmithgard Dan Smith from Patton Electronics:
Very helpful in fixing an XSS problem on our website.
@runlevelone     20 August, 2019
    Twitter runlevelone Per :
Thank you for the reported vulnerability! I thought I had those XSS pitfalls covered, but aparently not.
@randomthing4ev1     15 August, 2019
    Twitter randomthing4ev1 randomthing4ev1 from Name withheld:
Thank you for finding XSS on one of our websites.
@testmynet     29 July, 2019
    Twitter testmynet Damon from TestMy.net:
Thank you again! Nice find.
@testmynet     25 July, 2019
    Twitter testmynet Damon from TestMy.net:
Thank you for pointing out a variable that needed to be escaped.
@fukubacchi     29 May, 2019
    Twitter fukubacchi Yoshiki from IM:
Thank you very much for reporting the issue. It has been patched.
@Shopweezle     15 May, 2019
    Twitter Shopweezle Andreas from Company:
Thanks for help fixing issues.
Fast communication; good job.
@CouriernetI     12 May, 2019
    Twitter CouriernetI Alexander Janussek from Couriernet GmbH:
Thanks to the detailed information ELProfesor gave us, we could fix our vulnerabilities on our website. Very friendly and professional responses to our mails helped us a great deal. Thanks again. Great job.
@straysan     6 May, 2019
    Twitter straysan Martin from undisclosed:
Thanks for the heads up, ElProfesor. We appreciate the responsible disclosure.
@SoftwareDlp     18 April, 2019
    Twitter SoftwareDlp Ingo from dlp software:
Dear Taha, thank you for reporting XSS vulnerability on our site, was very helpful
@felixbuenemann     26 February, 2019
    Twitter felixbuenemann Felix Bünemann from LOUIS INTERNET:
Responsibly disclosed an XSS problem in a customer's website with working PoC that could quickly be fixed.
@SOSLaChapelle     2 January, 2019
    Twitter SOSLaChapelle Dev from QL:
Thanks for the information and report. The issue has been patched.
@jcopley     28 November, 2018
    Twitter jcopley Joe Copley from Copley Internet Systems:
Thank you very much for informing us about a security vulnerability on our site. It has been patched. Keep up the good work!
@laviavigdor     24 November, 2018
    Twitter laviavigdor Lavi from Simania:
Thank you for reporting XSS issues. It's patched now.
@dJoceNet     21 November, 2018
    Twitter dJoceNet Jocelyn from eiffel.org:
Thank you for notifying us of the issue and check it was fixed!
@doccry     19 November, 2018
    Twitter doccry Thorsten from digenial GmbH:
Many thanks for your XSS reporting
@HoutVasthouden     13 November, 2018
    Twitter HoutVasthouden Bert from Woodwize:
Thank you for reporting XSS issues. It's patched now.
@davidbehler     31 October, 2018
    Twitter davidbehler David from PrepLounge:
Thank you very much for informing us about a XSS vulnerability.
@VytautasKr     24 October, 2018
    Twitter VytautasKr Vytautas from not-disclosed:
Thank you for taking the time and notifying about the issue in a responsible fashion!
@euvtechnology     16 October, 2018
    Twitter euvtechnology euvtechnology from Engel & Völkers Technology:
Dear Taha, Thank you for reporting the XSS vulnerability you discovered on our website and helping us ensuring the security of our webservices.
@HezMonaghan     14 October, 2018
    Twitter HezMonaghan Hez from JS:
Super quick to reply, open and transparent. HUGE thanks to pointing out some issues!
@whitedataDE     10 October, 2018
    Twitter whitedataDE Dominik from whitedata Holding GmbH:
Thank you for your XSS report and fast response
@astroseekcom     3 October, 2018
    Twitter astroseekcom Petr9 from Astro-Seek.com:
Thank you for reporting XSS issues. It's patched now.
@Paruzzi_webm     24 September, 2018
    Twitter Paruzzi_webm Pim from Paruzzi:
He pointed out a problem in our seo url structure and we managed to fix the problem
@iwayAG     18 September, 2018
    Twitter iwayAG Matthias Cramer from iway AG:
Thanks for the detailed report and the fast ans competent communication.
@DCB_Singapore     17 September, 2018
    Twitter DCB_Singapore Mike from dreamcareerbuilder.com:
I would like to thank Taha for his help to discover the security in our website, without his help we couldn't locate it or even solve it.

Many thanks.
@PAOK_FC     17 September, 2018
    Twitter PAOK_FC Nikos S. from PAOK:
Thank you very much for informing us about the vulnerability and the help in fixing it!
@ROWeb_Ian     3 September, 2018
    Twitter ROWeb_Ian Ian from Rochdale Online:
Thanks Taha for your assistance and professionalism when identifying an XSS vulnerability.
@wirthundhorn     22 August, 2018
    Twitter wirthundhorn Support from dtv.de:
Thank you very much helping us fixing CSRF vulnerability.
@frecl     17 August, 2018
    Twitter frecl Frank from Reclam:
Taha provided quick and fair information on a vulnerability, so we could fix the problem very quickly. Thanks very much!
@MaartenCouvreur     16 August, 2018
    Twitter MaartenCouvreur Maarten from Cocrecom:
Thank you for reporting an XSS issue!
@cyberday_gmbh     23 July, 2018
    Twitter cyberday_gmbh D. Loy from CYBERDAY GmbH:
Thanks for reporting XSS issues
@scrmetal     22 July, 2018
    Twitter scrmetal Robby from Supreme Chaos Records:
Thank you for you immediate answer on questions and keep on on discovering!
@AneSybesma     2 July, 2018
    Twitter AneSybesma Ane from BHZNet.nl:
TAHA founda XSS vulnerability. Thanks!
@teamhively     20 June, 2018
    Twitter teamhively Julian from Hively:
Thanks Taha for reporting an issue and for your prompt and clear communication.
@lordlink     20 June, 2018
    Twitter lordlink lordlink from SQLI:
Thank you Taha for your efforts in making the web safer.
@husamb     14 June, 2018
    Twitter husamb Husamettin Batur from Sporx:
Thank you very much for informing XSS vulnerability in our website. Good work!
@SandiSchleicher     13 June, 2018
    Twitter SandiSchleicher SSchleicher from iConsumer:
Thank you Taha for your help identifying potential security issues. We appreciate your help in making our service more secure for our members and visitors.
@digisolid     4 June, 2018
    Twitter digisolid Martin Otte from Klik-info.nl:
TAHA helped us to find a XSS vulnerability. Thanks!
@iboulard     29 May, 2018
    Twitter iboulard Isabelle Boulard from CarpoolWorld:
Hi Taha,

Thank you for reporting this XSS vulnerability on our site!
@remecz     27 May, 2018
    Twitter remecz RZs from Pressflex:
Thank you Taha for spotting a XSS exploit. We appreciated the quick communication and information to help us resolve the issue promptly!
@ClementBourgoin     27 May, 2018
    Twitter ClementBourgoin Clément from Biblys:
Thanks for helping me discover an XSS bug.
@aartvdwerf     22 May, 2018
    Twitter aartvdwerf Aart from OI:
Thanks for letting us know about this XSS vulnerability. We appreciate the quick feedback.
@bobthenob     11 May, 2018
    Twitter bobthenob Bob Kolk from Tumbl Trak:
Thank you for the heads-up on our XSS issue!
@JayGilmore     8 May, 2018
    Twitter JayGilmore Jay Gilmore from MODX Systems:
We really appreciated the report and the fast communication with regard to our site issue. Taha is an excellent security professional.
@dsmithgard     4 May, 2018
    Twitter dsmithgard Dan Smith from Patton Electronics:
Thanks for alerting me to the vulnerability and providing a detailed explanation of the issue and how to reproduce it.
@dezertdezine     25 April, 2018
    Twitter dezertdezine Leon Miller from Dezert Dezine:
Thanks for letting us know about this XSS vulnerability. We appreciate the quick feedback.
@tobyweston     6 April, 2018
    Twitter tobyweston Toby from ELA:
Thanks to Taha for spotting a XSS exploit - We appreciated the feedback and information to help us resolve the issue promptly!
@fsocietyssl     9 March, 2018
    Twitter fsocietyssl Andrew from Wiley:
TAHA, Thank you for being very professional and catching the vulnerability. Thank you for doing an exceptional job!
@MedmediaDev     6 March, 2018
    Twitter MedmediaDev mmDev from MMC:
Many thanks, Taha, for your expedient response and explanation of the XSS issue. Thumbs up for the good guys, and Openbugbounty service in general!
@studisonline     30 January, 2018
    Twitter studisonline Oliver Iost from Studis Online:
Thanks to Taha for quickly sending me detailed information about the vulnerabilities. So it was easy to fix it soon.
@nietofarias     24 January, 2018
    Twitter nietofarias Ignacio Nieto from Despegar.com:
Thanks Taha for your findings at Despegar.com. Keep up the good work!
@TUHamburg     16 January, 2018
    Twitter TUHamburg Webmaster from TUHH:
Thanks for finding a XSS vulnerability and your fast and thorough feedback
@bishwadeepkc     16 January, 2018
    Twitter bishwadeepkc Bishwadeep KC from Career FAQs:
Thank you Taha for responding so Promptly. I really appreciate your work.
@RobMcGregor4     9 January, 2018
    Twitter RobMcGregor4 Rob McGregor from VERIZON:
Indeed professional, rapid to respond, and we do look forward to working together for any future issues identified. Keep up the good work!!
@_lockton_     3 January, 2018
    Twitter _lockton_ Laurence Lockton from University of Bath:
Thank you TAHA for you quick response
@busuuTech     8 December, 2017
    Twitter busuuTech Rob Elkin from busuu:
Thanks for catching a vulnerability and notifying us! Great and speedy communication!
@Mr_Papercut     5 December, 2017
    Twitter Mr_Papercut Mischa from Symbaloo:
Taha responded quickly to our questions, was very clear in pointing out the flaws he found, and thanks to his help we were able to deploy a fix within 24 hours. Thanks again TAHA!
@AdamHessDev     29 November, 2017
    Twitter AdamHessDev Adam from Brooklyn Law School:
TAHA was very quick to respond and clear about instructions for recreating the issue.
@supportdi31     23 November, 2017
    Twitter supportdi31 Patrick from Depeche Interactive:
Thanks to TAHA, one XSS vulnerability has been identified and resolved quickly. Greak work !
@khusroks     14 November, 2017
    Twitter khusroks Khusro K from Projectmanagement:
Taha is courteous, quick, professional, and diligent in investigating vulnerabilities. We appreciated his help in quickly resolving the issues he identified.
@colleo_fr     9 November, 2017
    Twitter colleo_fr Eric Rayer from Colleo:
Un grand merci à Taha qui nous a permis de combler une faille XSS, et nous a réouvert les yeux sur le reste. Aujourd'hui tout est propre :-)
@_patryks_     30 October, 2017
    Twitter _patryks_ Patryk from n/a:
Thanks for the feedback and help TAHA!
@notedekd     27 October, 2017
    Twitter notedekd Waroros Rojana from Dek-D:
Very quick and informative reporting. Appreciate your great effort.
@ArnY     25 October, 2017
    Twitter ArnY Anraud Abélard from Université de Nantes:
This researcher was very professional, efficient and quick to reply. Thanks for your work.
@itea97137491     23 October, 2017
    Twitter itea97137491 Vincent from n/a:
TAHA, quick response and very helpful to find our XSS issue. Thank you!
@PK16MS     23 October, 2017
    Twitter PK16MS Paul Kurzin from Vash Magazin:
TAHA was very helpful in discovering important vulnerabilities. Thank you for your work!
@fsocietyssl     19 October, 2017
    Twitter fsocietyssl Andrew Taitt from Wiley:
TAHA was very professional and helpful with reporting his findings. We appreciate your great work!
@DeanHalter     19 October, 2017
    Twitter DeanHalter Dean Halter from University of Dayton:
Appreciate Taha's efforts. Had the expertise to identify a vulnerability and the professionalism to handle disclosure/mitigation appropriately. Great work.
@rmwb     16 October, 2017
    Twitter rmwb Ross M. W. Bennetts from University of New England, Australia:
Prompt and professional, TAHA has been very helpful in detecting XSS issues and assisting us to resolve these issues.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:18752
Total reports on VIP sites:3826
Total patched vulnerabilities:4091
Recommendations received:132
Active since:25.05.2018
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate


Researcher Certificate

Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions


27.11.2019  Reflected xss in 360totalsecurity

i have found vulnerability in 360totalsecurity ,is Reflected XSS in https://blog.360totalsecurity.com

Steps to reproduce :

Go to https://blog.360totalsecurity.com

and To : https://blog.360totalsecurity.com/en/safe-tips-for-wannacry-ransomware-attack/?utm_campaign=WannaCry_tips&utm_content=360.NSA.defense.tool&utm_medium=text_link&utm_source=Blog

and replace utm_source value by this XSS payload : x”><svG onLoad=prompt(document.domain)>

Line: <a href=”https://blog.360totalsecurity.com/en?utm_source=x"><svG onLoad=prompt(document.domain)>

Poc:

https://blog.360totalsecurity.com/en/safe-tips-for-wannacry-ransomware-attack/?utm_campaign=WannaCry_tips&utm_content=360.NSA.defense.tool&utm_medium=text_link&utm_source=x"><svG onLoad=prompt(document.domain)>

Regards,

TAHA

21.11.2019  blind xss in apple

This is my report about blind xss in apple via user agent

  Latest Patched

 02.05.2024 iuclid6.echa.europa.eu
 02.05.2024 capim.pb.gov.br
 01.05.2024 siat-sz.edu.cn
 01.05.2024 tmsteam.me
 28.04.2024 pedralva.mg.gov.br

  Latest Blog Posts

04.12.2023 by BAx99x
Unmasking the Power of Cross-Site Scripting (XSS): Types, Exploitation, Detection, and Tools
04.12.2023 by a13h1_
$1120: ATO Bug in Twitter’s
04.12.2023 by ClumsyLulz
How I found a Zero Day in W3 Schools
04.12.2023 by 24bkdoor
Hack the Web like a Pirate: Identifying Vulnerabilities with Style
04.12.2023 by 24bkdoor
Navigating the Bounty Seas with Open Bug Bounty

  Recent Recommendations

    1 May, 2024
    Mek:
Got a recommendation to fix an SQL injection vulnerability on my website. As I am a hobbyist and my page is a hobby project, I can't offer money, so I am recommending this researcher. Thanks again.
    26 April, 2024
    I_bims_Mike:
Thank you very much for identifying the XSS vulnerability and for our friendly email exchange.
    22 April, 2024
    genoverband:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!
    10 April, 2024
    Mars:
Hatim uncovered a XSS bug that we were able to quickly resolve. Thanks very much for your assistance and help.
    8 April, 2024
    Panthermedia:
Thanks to the support of Hatim Chabik, we were able to identify and solve an XSS bug.