In need of a security check done by quality researchers? Want to steer the focus of the research? For unique projects as yours, we have a code.Learn more
With our 10.4 – Dedicated Hacker Time, we acknowledge your specific needs.
We appoint a project leader and settle on a fixed price for the amount of work that needs to be done, and in a couple of days, we have four Researchers (or more) on the job. They research what you need researched and deliver you a detailed report of their findings.
You do not have to worry about Researchers focussing on matters that are of less interest for you at that moment. Additional advantages our 10.4 offers are listed below.
Zerocopter Researchers/White Hats that have undergone a rigorous vetting
Even checking what is nót broken is on the table!
No matter the number of vulnerabilities we find
Dedicated Hacker Time can be set up and started in one (1!) workday
Follow everything we do live –and take immediate action– through our platform
Quick and direct communication through Slack
Based on the scope of the project, we deliver a detailed report of our findings to you. This key-information provides you with the opportunity to improve your security measures further.
After receiving an invite to the platform, you can log in and create a project. Your project can be a Researcher Program, a Coordinated Vulnerability Disclosure, Automated Scanning or for those with a specific project, Dedicated Hacker Time.
You decide which parts of your application are tested by our automated scanners and researched by our team of ethical hackers. You have complete control over the do’s and don’ts that apply to the way vulnerabilities are unearthed and the allowed and disallowed technical methods.
Well-written and evidence-based reports will, after being checked by our experienced Triage Team, pop up in your platform dashboard. Constructive reports by constructive hackers.
After receiving a report with a vulnerability, you can take the required measures to ensure this vulnerability is solved. After, you can ask the involved researcher for a retest in which the researcher will assess if the updated safety measure is adequate and well implemented. Is the vulnerability is resolved, the researcher is paid.