Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Numerous open-source elements, including WordPress plugins and upcoming PHP extensions, are available for auditing. You can swiftly identify the most widely used components that present the largest attack surfaces, which are conveniently cataloged by Plugbounty. For every vulnerability you discover, you will earn a research score, and participants will be ranked on weekly and monthly leaderboards based on their scores. Regardless of a vendor's response to your discoveries, the Plugbounty team will evaluate your report, ensuring you receive your research score. Additionally, top researchers on the leaderboard will be rewarded with a predetermined budget each month. This system encourages continual engagement and promotes a collaborative environment for security improvement.
Description
The premier platform for enterprise application security is powered by the finest ethical hackers globally. Depending on the scale and intricacy of the projects your organization intends to undertake, you can be classified as either a beginner or an enterprise-level client. Our platform simplifies the management of your security initiatives while we take care of validating and overseeing all reports generated by your teams. With the expertise of top ethical hackers, your security efforts will receive a significant boost. Assemble a dedicated team of exceptional ethical hackers tasked with uncovering hidden vulnerabilities within your applications. We provide support in selecting the appropriate services, establishing programs, defining project scopes, and connecting you with rigorously vetted ethical hackers who align with your requirements. Together, we will outline the parameters of the Researcher Program, you’ll set the budget, and we’ll collaboratively decide on the commencement date and duration of the initiative, ensuring that you have the most suitable team of ethical hackers in place. Additionally, our goal is to enhance your overall security posture through a tailored, collaborative approach to vulnerability discovery.
API Access
Has API
API Access
Has API
Integrations
No details available.
Integrations
No details available.
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
€1.000 per month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
PlugBounty
Website
www.plugbounty.com
Vendor Details
Company Name
Zerocopter
Founded
2015
Country
Netherlands
Website
www.zerocopter.com
Product Features
Product Features
Application Security
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection