Bug Bounty Hunter

Ethical Hacking & Responsible Disclosure

10+ Vulnerabilities Reported
4 Organizations Helped
2023-2025 Active Period
100% Responsible Disclosure

About Bug Bounty Hunting

Bug bounty hunting is the practice of finding and responsibly disclosing security vulnerabilities in web applications, mobile apps, and other digital systems. As an ethical hacker, I help organizations improve their security posture by identifying weaknesses before malicious actors can exploit them.

Ethical Approach: All security research is conducted with proper authorization and follows responsible disclosure practices to ensure organizations can fix vulnerabilities before they become public.

Organizations Secured

Successfully identified and reported vulnerabilities across various high-profile organizations, helping them strengthen their security infrastructure:

NASA

Government Agency

National Aeronautics and Space Administration - Critical infrastructure security research.

  • Unrestricted File Upload in a NASA web application Critical
  • Cross-Site Scripting (XSS) in public portal Medium

Red Bull

Corporate

Global energy drink company - E-commerce and marketing platform security assessment.

  • Local File Inclusion (LFI) in promotional website High
  • CRSF to Reflected XSS in a web application Medium
  • Cross-Site Scripting (XSS) a marketing page Medium

Dutch Government

Government

Netherlands government services - Critical infrastructure and citizen data protection.

  • Local File Inclusion (LFI) to RCE on a development server Critical
  • XSS in websites made for the public Medium

Various Organizations

Multiple Sectors

Additional security research across various platforms and organizations.

  • Plaintext Creditcard exports internet facing Critical
  • SSRF to LFI to RCE in a corporate web application Critical
  • Unrestricted File Upload in a web application Critical

Bug Hunting Timeline

End 2023

Started Bug Bounty Journey

Began ethical hacking and vulnerability research, focusing on web application security and specifily the Vulnerable Disclosures, like Redbull and The Dutch Government

Early 2024

First Major Discoveries

Successfully identified and reported critical vulnerabilities in government infrastructure, establishing reputation in the security community.

Mid 2024

Corporate Security Research

Expanded research to include corporate targets, discovering high-impact vulnerabilities in major brand applications and services.

2025

Continued Excellence

Ongoing security research with focus on emerging technologies and advanced attack vectors, maintaining 100% responsible disclosure rate.

Methodology & Tools

My bug hunting approach combines automated tools with manual testing techniques to identify vulnerabilities that might be missed by traditional security scans:

Reconnaissance

  • Subdomain enumeration
  • Technology stack identification
  • Attack surface mapping
  • OSINT gathering

Testing Techniques

  • Manual code review
  • Business logic testing
  • Authentication bypass
  • API security assessment
Collaboration: Working closely with security teams to ensure vulnerabilities are properly understood and remediated, contributing to the overall security ecosystem.

🏆 Recognition & Rewards

Special acknowledgments received for responsible disclosure

NASA Thank You Letter

NASA Thank You Letter

Official recognition from NASA for discovering critical vulnerabilities in their systems

📧 Official Letter
Dutch Government Hacker T-shirt

Dutch Government Hacker T-shirt

Exclusive t-shirt reward given to ethical hackers who help secure government infrastructure

👕 Exclusive Swag