What is your cybersecurity need?
Protect your evolving assets.
Scale app security across the SDLC.
Build your brand and protect your customers.
Meet compliance requirements and more.
Reshaping the way companies find and fix critical vulnerabilities before they can be exploited.
The first step in receiving and acting on vulnerabilities discovered by third-parties.
Continuous testing to secure applications that power organizations.
Establish a compliant vulnerability assessment process.
Highly vetted, specialized researchers with best-in-class VPN.
Enhance your hacker-powered security program with our Advisory and Triage Services.
Home > Blog > hacker resources
After 1 month of our community’s best and brightest going head to head to be named Hack The World 2017 champion, we are ready to share the winners of the annual contest. We also want to share some lessons learned, and give each of you the opportunity to share feedback with us so that we can improve on future contests.
We kick off this year’s hacker spotlight with @jin0ne from Shanghai with over 200 valid vulnerabilities submitted. Read more about him in this newest blog post.
HackerOne’s Policies Received Updates - check them out now!
Announcing the first group of Hacker Brand Ambassadors who will lead hackers in their local area.
German hacker, Julien Ahrens or @mrtuxracer tells us how he got started in security and what it’s like to be a full time bug bounty hunter.
FAQ's from HackerOne's biggest virtual live hacking event with The Paranoids from Verizon Media, H1-2010.
Bug bounty hunter and security consultant Pieter or @honoki is featured on this week’s Hacker Spotlight to talk about programs and what makes them exciting.
Announcing the Hacker Brand Ambassador Program: lead hackers in your city, get exclusive perks, further your career.
HackerOne’s first-ever hacker conference, h@cktivitycon streamed from Twitch on Friday, July 31st - August 1st, 2020 recapped in this blog post.
Learn the basics of pentesting to further your career and develop core competencies required in one of the hottest job markets in cybersecurity: Penetration testing.
As part of our $100 Million in bounties celebration, we want to share a list of 100 tools and resources that will help hackers continue hacking!