Dedicated Hacker Time: We research your unique project for a fixed price

In need of a security check done by quality researchers? Want to steer the focus of the research? For unique projects as yours, we have a code.

Learn more

Code 10.4 – Dedicated Hacker Time

With our 10.4 – Dedicated Hacker Time, we acknowledge your specific needs.

We appoint a project leader and settle on a fixed price for the amount of work that needs to be done, and in a couple of days, we have four Researchers (or more) on the job. They research what you need researched and deliver you a detailed report of their findings.

You do not have to worry about Researchers focussing on matters that are of less interest for you at that moment. Additional advantages our 10.4 offers are listed below.

Code 10.4 – Dedicated Hacker Time
Quality

Quality

Zerocopter Researchers/White Hats that have undergone a rigorous vetting

Custom arrangements

Custom arrangements

Even checking what is nót broken is on the table!

A fixed price

A fixed price

No matter the number of vulnerabilities we find

Quick start

Quick start

Dedicated Hacker Time can be set up and started in one (1!) workday

Live action

Live action

Follow everything we do live –and take immediate action– through our platform

Direct communication

Direct communication

Quick and direct communication through Slack

Receive a detailed report

Based on the scope of the project, we deliver a detailed report of our findings to you. This key-information provides you with the opportunity to improve your security measures further.

Receive a detailed report
Create a project

How our platform works

Step 1

Create a project

After receiving an invite to the platform, you can log in and create a project. Your project can be a Researcher Program, a Coordinated Vulnerability Disclosure, Automated Scanning or for those with a specific project, Dedicated Hacker Time.

Communicate with researchers directly

How our platform works

Step 2

Communicate with researchers directly

You decide which parts of your application are tested by our automated scanners and researched by our team of ethical hackers. You have complete control over the do’s and don’ts that apply to the way vulnerabilities are unearthed and the allowed and disallowed technical methods.

Receive constructive reports

How our platform works

Step 3

Receive constructive reports

Well-written and evidence-based reports will, after being checked by our experienced Triage Team, pop up in your platform dashboard. Constructive reports by constructive hackers.

Solve vulnerabilities

How our platform works

Step 4

Solve vulnerabilities

After receiving a report with a vulnerability, you can take the required measures to ensure this vulnerability is solved. After, you can ask the involved researcher for a retest in which the researcher will assess if the updated safety measure is adequate and well implemented. Is the vulnerability is resolved, the researcher is paid.

Want to make use of Dedicated Hacker Time?

Contact us
Want to make use of Dedicated Hacker Time?