All Collections
FAQ For Business
28 articles
How works the connection HackenProof -> Jira
Company users and their roles
How the connection HackenProof -> Discord works
How connection HackenProof -> Telegram works
How the connection HackenProof -> Zapier WebHook works
VDP iFrame for Bug Bounty program
Manage your bug bounty program
What is a Bug Bounty?
How do bug bounties fit with traditional security assessment methods?
What types of bug bounty programs can be launched for my product?
What’s the difference between public and private programs?
How does it work?
Who performs the testing?
What conditions are required to qualify for a bounty reward?
How the connection HackenProof -> Slack works
How the connection HackenProof -> Zapier WebHook -> PagerDuty works
What types of things can your crowd test?
Why would an organization invite hackers to break into their software?
Are white hat hackers trustworthy?
If I need a penetration test, can you help me
How are researchers compensated for their services?
What kind of results can I expect from HackenProof Bug Bounty?
Can a hacker publicly disclose vulnerabilities found in my application?
What is triage?
How do I determine the bounty amount?
What kinds of vulnerabilities do hackers usually find?