Prial Islam

Slide Hi I'm Prial Islam AKA 0xPrial I am a full-time student of Power Engineering and a part-time learner at Cyber Security stuffs. Also doing Bug Bounty hunting and currently ranked 125th on Synack Red Team, 120th on Bugcrowd, and have over 3000 Reputation Points on HackerOne Bug Bounty Platform. I actively take part in CTF (Capture the flag) challenges to learn new things and sharpen my skills. Read My Blog 0xPrial 0xPrial 0xPrial See My Work

About me

A teenage boy with a passion for Breaking Security_____

I’m an Independent Security Researcher and Red Team Member at Synack inc. I’m currently working in the cybersecurity sector mainly as a Bug Bounty Hunter and Penetration Tester, performing web/mobile application security assessments and network security assessments.

With over 3 years of experience, I've identified major security vulnerabilities in the world's well-known companies including Google, Facebook, Microsoft, Twitter, Yahoo, Uber, etc. Acknowledged by more than hundreds of companies and listed in over +100 Halls of Fame.

Profile data-bro

My Skills

My Skills Can Help You To Secure Your Assets

I have 3+ years of experience in web/mobile application security assessments and network security testing. I Write blogs on topics related to cybersecurity and Bug Bounty as a guest writer and for my own blog located at

Hacking Skills

Website Security Testing
Web Application Security Testing
Mobile Application Security Testing
API Security Testing
Network Security Testing

Coding Skills



  • Digital design
  • social networking
  • social media
  • social engineering
  • time management
  • communication
  • problem-solving
  • Reverse Engineering
  • Cryptography
  • Analytics & Intelligence
  • Steganography
  • Reconnaissance
  • Capture The Flag
  • Cyber Security
  • Firewall/IDS/IPS
  • python


My services are mainly manual or automated penetration testing to identify any vulnerability.

Penetration testing is also commonly referred to as a pen test (or ethical hacking) and is a method used to perform security testing on a system or asset used by a business or other organization. Pen tests involve a variety of methodologies designed to explore a company's assets to identify potential vulnerabilities and test to ensure the vulnerabilities are real.

Web-App Penetration Testing

Provides a complete manual Penetration Test against the web application in order to ensure its safety.

Network Penetration Testing

Provides a complete manual Penetration Test to improve network security and provide protection for the entire network and connected devices against future attacks.

Mobile App Penetration Testing

Provides iOS and Android Application Penetration Testing in order to make the mobile app secured using manual or automated penetration testing methods to identify any vulnerability.

My acknowledgements

Acknowledgement is the only way to keep love alive
~ Barry Long

Got Acknowledged by more than 250 Well Known Companies for Reporting Security Vulnerabilities in their Services and Products. Acknowledgments include monetary rewards, Certificates, Hall Of Fame, and Swags. Some Of My Top Acknowledgements are ...

0 +

Valid reports

0 +

bug bounty acknowledgements

0 +

year's Experience

My Write-Ups

My personal blog

My recent research works on Bug Bounty and Ethical Hacking.

XSS WAF & Character limitation bypass like a boss

XSS WAF & Character limitation bypass like a boss

Hello fellow Hackers! I am sitting in my room for the last 3 days due

Unicode vs WAF — XSS WAF Bypass

Unicode vs WAF — XSS WAF Bypass

Hi readers, At 1st Eid Mubarak to all. May Allah bring you joy, happiness, peace,

XSS bypass using META tag in

XSS bypass using META tag in

Hi readers, Today I will write about a XSS Vulnerability I reported to the