Hack and Take the Cash !

744 / 744 bounties in database
28/05/2018

Bitwarden


Policy

Bitwarden believes that working with security researchers across the globe is crucial to keeping our users safe. If you believe you've found a security issue in our product or service, we encourage you to notify us. We welcome worki(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Intel Corporation


Security is a Collaboration

Intel Corporation believes that working with skilled security researchers across the globe is a crucial part of identifying and mitigating security vulnerabilities in Intel products and technologies. Like other(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Toyota


Policy

Toyota is committed to maintaining an effective partnership with the cybersecurity community. We value your contributions and appreciate the opportunity to work with you.

Scope

Reports submitted through this website for t(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Coalition, Inc.


Policy

We take security, transparency, and the trust of our users seriously. Coalition appreciates the work of security researchers, and we’ve developed this program to make it easy to report vulnerabilities, and to recognize you for your(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Vend


Policy

At Vend, we love fostering new relationships with the security community to find security vulnerabilities in order to keep Vend and its customers safe. Vend will make a best effort to respond to incoming reports within 5 business da(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Reward

500 $

Nimiq


Policy

Nimiq is the world’s first browser-based blockchain and ecosystem. We look forward to working with the community to find security vulnerabilities in order to keep our protocol and official implementation as safe as possible. You can(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Reward

100 $

Raise


Program Rules

Raise.com looks forward to working with the security community to find security vulnerabilities in order to keep our businesses and customers safe. Please review the following program rules before you report a vulnerability.(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Reward

100 $

Vanilla


Policy

Howdy, stranger! Vanilla has been free and open source software since 2006. Our current version is offered as both an open source download and as a cloud service via Vanilla Forums, Inc. We have an active open source community at o(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Reward

100 $

Plaid


Policy

Plaid looks forward to working with the security community to find security vulnerabilities in order to keep our business and customers safe.

SLA

Plaid will make a best effort to meet the following SLAs for hackers partic(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Reward

100 $

Upserve


Policy

Upserve is committed to protecting the privacy and security of our users. We recognize the valuable role security researchers play in making our services more secure and are committed to working with you to verify and resolve legit(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

LifeOmic


Policy

LifeOmic looks forward to working with the security community to find security vulnerabilities in order to keep our businesses and customers safe.

SLA

LifeOmic will make a best effort to meet the following SLAs for hacker(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

MyCrypto


Policy

MyCrypto looks forward to working with the security community to find security vulnerabilities in order to keep our businesses and customers safe. We are particularly interested in vulnerabilities found in the application layer, bu(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Nokogiri


Policy

The Nokogiri Core Contributors take security very seriously and investigate all reported vulnerabilities. If you would like to report a vulnerablity or have a security concern regarding Nokogiri or how Nokogiri is using any of its u(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Loofah


Policy

The Loofah core contributors take security very seriously and investigate all reported vulnerabilities. If you would like to report a vulnerablity or have a security concern regarding Loofah, please report it via HackerOne (https(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Reward

100 $

VHX


Policy

VHX is committed to protecting our customers' data and privacy. We greatly respect the work of security experts everywhere, and strive to stay up to date with the latest security techniques. If you have discovered a security issue(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Reward

50 $

Reverb.com


Policy

Please make sure you do all of your testing on sandbox.reverb.com. No technology is perfect, and Reverb.com believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any techn(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

JamieWeb


Policy

Please make sure you do all of your testing on sandbox.reverb.com. No technology is perfect, and Reverb.com believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any techn(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Shopee


Policy

Shopee is participating in the Google Play Security Rewards Program (https://hackerone.com/googleplay). While we do not have a full disclosure program in place at this time, we are willing to accept reports that qualify for the Goo(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Reward

150 $

Deliveroo


Goals

Hi! If you’re here then you already know that security is a critical quality for a company to imbue into all of its products, and we expect that you’re an experienced bug-hunter who’s found something interesting, so let’s skip the e(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Reward

200 $

Hyperledger


Policy

NOTE: None of the web sites run by The Linux Foundation or by Hyperledger are eligible for the bounty. That means only the code in the Hyperledger Fabric codebase is eligible for the bounty. Everything else, including our website(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Reward

100 $

Cobinhood


Policy

COBINHOOD SECURITY POLICY PAGE

COBINHOOD is the next-generation cryptocurrency service platform with security as its top priority. COBINHOOD recognizes the importance of security researchers in helping keep the platform and(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Reward

400 $

RSK


Policy

RSK has created this bug bounty program to reward security researchers that dedicate time and effort to improve the RSK platform.

SLA

RSK will make a best effort to meet the following SLAs for hackers participating in ou(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Reward

50 $

Outbound


Policy

BUG BOUNTY POLICY

Capitalized terms used in this Bug Bounty Policy and not otherwise defined have the meaning ascribed to such terms in our Terms of Service (https://www.outbound.io/tos). Outbound aims to keep its Servic(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Reward

100 $

Monaco


Policy

Monaco recognizes the importance of security researchers in helping keep our community safe. We encourage responsible disclosure of security vulnerabilities via our bug bounty program described on this page. Note: This program is f(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Goldman Sachs VDP


Committed to Coordination

Maintaining the security of our applications and networks is a high priority for Goldman Sachs. If you have information related to security vulnerabilities of GS products and services, please submit a report in ac(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Reward

100 $

Quantopian


Policy

What is Quantopian?

Quantopian inspires talented people everywhere to write investment algorithms. Select authors may license their algorithms to us and get paid based on performance. At the heart of Quantopian is a Python(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Tendermint


Tendermint Bug Bounty Program

At Tendermint, proactively finding and fixing bugs is a vital part of building strong, resilient blockchain protocols. Our program exists to actively reward the people who discover bugs in our protocol and th(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/05/2018

Passit


Policy

No technology is perfect, and Burke Software and Consulting believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issu(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
23/04/2018

Reward

50 $

BlaBlaCar


About the company

BlaBlaCar is the world leader in long-distance carpooling. We are an innovative and fast-growing company building a unique community of members to transform the way people travel! Since 2013, BlaBlaCar has grown exponen(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
14/04/2018

Reward

Microsoft


Today, Microsoft is announcing the launch of a limited-time bounty program for speculative execution side channel vulnerabilities. This new class of vulnerabilities was disclosed in January 2018 and represented a major advancement in the research in(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
30/01/2018

Reward

100 $

Showmax


No technology is perfect, and Showmax believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encour(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
30/01/2018

Crowdstrike


Policy

CrowdStrike encourages researchers to follow responsible disclosure procedures when reporting security issues in our products, services, websites, or infrastructure. CrowdStrike is committed to engaging with the research community in(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
18/12/2017

Reward

50 $

SEMrush


Policy

No technology is perfect, and SEMrush believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or se(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
18/12/2017

AlienVault


Welcome to AlienNation. We're on a mission to provide organizations throughout the universe with highly intelligent security that is affordable and simple to use. To help out with our goals here at AlienVault, we look to our fellow security professio(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
18/12/2017

Reward

100 $

VLC


Policy

Appendix 1: Program Policy

Please note, this is the suggested starting policy language for the program. Based on responses from the community of bug hunters, changes may be made throughout the testing period. All changes(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
18/12/2017

RBKmoney


Policy

RBKmoney Vulnerability Disclosure Program policy

If you found a security vulnerability at any of RBKmoney services, let us know. We will review all legitimate reports and do our best to quickly fix the issue. Before report(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
18/12/2017

JohnBlackbourn


Policy

I maintain a number of popular open source WordPress plugins which deal with user authentication and sensitive information. I believe that the more eyes that software sees, the more secure it can be. If you believe you've found a se(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
18/12/2017

Deconf


Policy

Google Analytics Dashboard for WP (GADWP) is an open-source plugin for WordPress which connects Google Analytics with your website. You can find source code at https://github.com/deconf/Google-Analytics-Dashboard-for-WP.

Respo

(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
18/12/2017

Node.js third-party modules


Policy

No technology is perfect, and Node.js believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in a third-party Nod(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Reward

500 $

Data Processing (IBB)


Policy

The Internet Bug Bounty is offering rewards to security researchers who resolve critical vulnerabilities in core infrastructure data processing libraries. Critical vulnerabilities in these libraries have widespread consequences to(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Reward

25 $

Blockstack


Policy

Welcome Blockstack is building a new decentralized internet where users own their data and apps run without remote servers. We're rethinking DNS, identity, authentication, and application infrastructure and worki(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Aspen


Policy

No technology is perfect, and we believe that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in Aspen, we encourage yo(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

bitwarden


Policy

bitwarden believes that working with security researchers across the globe is crucial to keeping our users safe. If you believe you've found a security issue in our product or service, we encourage you to notify us. We welcome work(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Reward

100 $

WINK


Policy

No technology is perfect, and WINK believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or serv(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Razer US


Policy

Razer looks forward to working with the security community to find security vulnerabilities in order to keep our businesses and customers safe. Razer will make a best effort to respond to incoming reports within 3 business days and(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Reward

Google Play Security Reward Program


Policy

Google Play is working with the independent bug bounty platform, HackerOne, and the developers of popular Android apps to implement the Google Play Security Reward Program. Developers of popular Android apps are invited to opt-in t(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Infogram


Policy

Responsible disclosure

To join the program you should read this whole page, and only proceed if you are OK with everything. If you disclose your findings responsibly, we will not bring any lawsuit against you or launch an(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Reward

Inflection


Policy

At Inflection, we're always looking for ways we can improve the security of our software. We know that no technology is perfect, and that's why we believe in working with the security community to find and squash vulnerabilities in(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Headspace


Policy

Headspace is participating in the Google Play Security Rewards Program. While we do not have a full disclosure program in place at this time, we are willing to accept reports that qualify for the Google Play Security Rewards Progra(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Duolingo


Policy

Duolingo is participating in the Google Play Security Rewards Program. While we do not have a full disclosure program in place at this time, we are willing to accept reports that qualify for the Google Play Security Rewards Program(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward


List your Bug Bounty for free immediately!

Contact us if you want more information.

FireBounty (c) 2016