Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Adobe PDF Library SDK Reviews & Ratings
    35 Ratings
    Company Website
  • Odoo Reviews & Ratings
    1,601 Ratings
    Company Website
  • qTest Reviews & Ratings
    Company Website
  • Aikido Security Reviews & Ratings
    103 Ratings
    Company Website
  • Twilio Reviews & Ratings
    1,305 Ratings
    Company Website
  • Bitrise Reviews & Ratings
    382 Ratings
    Company Website
  • Wiz Reviews & Ratings
    1,059 Ratings
    Company Website
  • Guru Reviews & Ratings
    3,443 Ratings
    Company Website
  • Windsurf Editor Reviews & Ratings
    144 Ratings
    Company Website
  • Google Cloud Platform Reviews & Ratings
    57,138 Ratings
    Company Website

What is huntr?

Receive rewards for detecting and addressing security vulnerabilities in open source software while earning acknowledgment for your efforts toward enhancing global safety. We recognize the significance of nurturing the entire open source community rather than exclusively concentrating on enterprise-supported initiatives. Consequently, our bug bounty program provides incentives for identifying weaknesses in GitHub projects, irrespective of their size. Participants can anticipate various rewards, including bounties, merchandise, and CVE recognitions. By joining us, you will contribute to a more secure digital environment while simultaneously building your credibility within the cybersecurity field. Your involvement not only enhances your skills but also reinforces the collective effort to protect users worldwide.

What is Intigriti?

Discover how organizations globally can harness bug bounty communities to enhance their security testing efforts and improve vulnerability management. Obtain your copy today. Unlike penetration testers who adhere to established security protocols, malicious hackers operate unpredictably. Traditional automated tools merely provide a superficial analysis of security. Engage with top-tier cybersecurity researchers to access innovative security testing solutions. By staying informed about evolving security vulnerabilities, you can effectively thwart cybercriminal activities. A conventional penetration test is constrained by time and only provides a snapshot of security at one point. Initiate your bug bounty program to safeguard your assets continuously, day and night. Our customer service team will assist you in launching your program with just a few simple clicks. We ensure that you reward bounties only for unique and validated security vulnerability reports, as our expert team meticulously reviews each submission before it reaches us. This comprehensive approach allows you to maintain a robust security posture in an increasingly complex threat landscape.

Media

Media

Integrations Supported

Brinqa
Jira
Slack

Integrations Supported

Brinqa
Jira
Slack

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

huntr

Date Founded

2019

Company Location

United Kingdom

Company Website

huntr.dev/

Company Facts

Organization Name

Intigriti

Date Founded

2016

Company Location

Belgium

Company Website

www.intigriti.com

Categories and Features

Categories and Features

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Popular Alternatives

Popular Alternatives

SafeHats Reviews & Ratings

SafeHats

InstaSafe