Go to HackenProof
All Collections
FAQ For Business
FAQ For Business
D
25 articles in this collection
Written by
Dmytro
General
How the connection HackenProof -> Discord works
Get notifications about new reports, report status, and report severity changes
D
Written by
Dmytro
Updated over a week ago
How connection HackenProof -> Telegram works
Get notifications about new reports, report status, and report severity changes
D
Written by
Dmytro
Updated over a week ago
How works the connection HackenProof -> Jira
D
Written by
Dmytro
Updated over a week ago
Company users and their roles
D
Written by
Dmytro
Updated over a week ago
VDP iFrame for Bug Bounty program
Vulnerability Disclosure Page (VDP) for your website
D
Written by
Dmytro
Updated over a week ago
Manage your bug bounty program
This guide describes all the possible stages of your bug bounty program
D
Written by
Dmytro
Updated over a week ago
What is a Bug Bounty?
D
Written by
Dmytro
Updated over a week ago
How do bug bounties fit with traditional security assessment methods?
Why is a crowdsourced approach to security important
D
Written by
Dmytro
Updated over a week ago
What types of bug bounty programs can be launched for my product?
We explain the 3 main types of bug bounty programs. They are next.
D
Written by
Dmytro
Updated over a week ago
What’s the difference between public and private programs?
D
Written by
Dmytro
Updated over a week ago
How does it work?
The general workflow of a bug bounty program
D
Written by
Dmytro
Updated over a week ago
Who performs the testing?
D
Written by
Dmytro
Updated over a week ago
What conditions are required to qualify for a bounty reward?
D
Written by
Dmytro
Updated over a week ago
Pricing
Replenish your account balance
This guide shows on how to replenish your company account balance at HackenProof
D
Written by
Dmytro
Updated over a week ago
HackenProof's Bug Bounty Platform Pricing
Estimate your subscriptions cost based on our pricing plans
D
Written by
Dmytro
Updated over a week ago
Crowdsourced cybersecurity basics
What types of things can your crowd test?
D
Written by
Dmytro
Updated over a week ago
Why would an organization invite hackers to break into their software?
D
Written by
Dmytro
Updated over a week ago
Are white hat hackers trustworthy?
D
Written by
Dmytro
Updated over a week ago
If I need a penetration test, can you help me
D
Written by
Dmytro
Updated over a week ago
How are researchers compensated for their services?
D
Written by
Dmytro
Updated over a week ago
What kind of results can I expect from HackenProof Bug Bounty?
D
Written by
Dmytro
Updated over a week ago
Can a hacker publicly disclose vulnerabilities found in my application?
D
Written by
Dmytro
Updated over a week ago
What is triage?
D
Written by
Dmytro
Updated over a week ago
How do I determine the bounty amount?
D
Written by
Dmytro
Updated over a week ago
What kinds of vulnerabilities do hackers usually find?
D
Written by
Dmytro
Updated over a week ago