bug bounty

CODEX Launches Bug Bounty Program on HackenProof
  • Network
  • bug bounty
  • +7

CODEX Launches Bug Bounty Program on HackenProof

CODEX, a licensed cryptocurrency and digital asset exchange based in Estonia, partners with HackenProof bug bounty platform. As a part of our broad and ongoing partnership, CODEX decided to start a public bug bounty program on HackenProof. Previously, CODEX went through web penetration testing by Hacken and appeared to get the highest web platform security

3 Apr 2019

Bug Bounty for Crypto Exchanges
  • Insights
  • analitycal assessment
  • +8

Bug Bounty for Crypto Exchanges

Table of Contents The merger of crypto and crypto hacks: A Short History Crypto exchange hacks Statistics Advantages of BB Can a researcher blackmail me? Afterword The merger of crypto and crypto hacks: A Short History 2009 — the bitcoin network was born when Satoshi Nakamoto mined the first block of the chain, known as

15 Jan 2019

How to hack TTC Protocol?
  • Network
  • bug bounty
  • +8

How to hack TTC Protocol?

HackenProof is hosting a bug bounty program for a modern social networking protocol based on blockchain called TTC Protocol. Let’s take a short look at their whitepaper, describe the main concepts and some technical details. Then we’ll show you how to run a node to start bug hunting on TTC Bug Bounty Program. 1. TTC

3 Dec 2018

HackenProof Customer Story: Uklon
  • Network
  • bug bounty
  • +8

HackenProof Customer Story: Uklon

As you may already know, last month HackenProof has hosted an onsite bug bounty marathon called Hacken Cup. We’ve invited 25 of our community members – a carefully selected group of some of the most talented hackers in the world to come to Ukraine and test 3 products: a local ridesharing service – Uklon, blockchain-based

16 Nov 2018

HackenProof guide to Vulnerability Disclosure Policy
  • Discover
  • bug bounty
  • +6

HackenProof guide to Vulnerability Disclosure Policy

WHAT IS A VULNERABILITY DISCLOSURE POLICY? A vulnerability disclosure policy (VDP), also known as the Responsible Disclosure Policy (RDP) is a legal statement by a company, that describes how a company will process vulnerability reports submitted by ethical hackers. By publishing a VDP, a company is basically saying that it won’t prosecute or press charges

9 Nov 2018

Crypviser Network at Hacken Cup
  • Network
  • bug bounty
  • +8

Crypviser Network at Hacken Cup

On the 8th of October, bug bounty platform HackenProof hosted an onsite bug-bounty marathon – Hacken Cup, where 25 top hackers were testing 3 products, one of which was an all-in-one decentralized communications platform Crypviser Network.A few days before the event, hackers received partial information about the companies to conduct preliminary recon on the targets.

24 Oct 2018

Crypviser is to take part in Hacken Cup
  • Network
  • bug bounty
  • +5

Crypviser is to take part in Hacken Cup

HackenProof is delighted to state that a German cybersecurity company Crypviser is taking part in an onsite bug bounty marathon Hacken Cup where top 25 hackers are going to test the application to the limit! The Crypviser Network is an all-in-one decentralized communications platform, featuring not only instant messaging, voice and video calls, but also

8 Oct 2018

How to hack VeChainThor?
  • Discover
  • bug bounty
  • +8

How to hack VeChainThor?

HackenProof has several VeChain Bug Bounty Programs, such as VeChainThor and VeChainThor Wallet (with quite a hefty compensation system, we might add). VeChain is a blockchain protocol which may seem to be difficult to test. However, we’ll try to show you that it’s not difficult to start bug hunting – we’ll demonstrate business VeChain concepts,

28 Sep 2018

Hacken will Help TTC Protocol to Protect Customer Data
  • Case Studies
  • bug bounty
  • +8

Hacken will Help TTC Protocol to Protect Customer Data

Company: TTC ProtocolCompany description: Social networking ecosystem on the blockchainService: Smart contract audit, penetration testing, and bug bounty

24 Sep 2018

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo