Choose a service package that meets your requirements>

Choose a service package that meets your requirements

If you need help with choosing the right solution, please
contact us.

Icon Package S

Package S

Suitable for a simple web or application that processes a minimum of personal data (name, e-mail) as part of a registration or online form. including bonuses for ethical hackers

The package also includes a set up fee, bounties for ethical hackers and moderator services.

Find out more
includes
vulnerability scan
We recommend
Icon Package M

Package M

Great for a corporate website, e-shop or mobile application that also processes sensitive data like address, tel. number, ID cards, credit card numbers, and more.

The package also includes a set up fee, bounties for ethical hackers and moderator services.

Find out more
includes
vulnerability scan
Icon Package L

Package L

Ideal for more complex portals and interfaces that deal with financial and other, very sensitive data like, for example, health, corporate accounting, or important know-how.

The package also includes a set up fee, bounties for ethical hackers and moderator services.

Find out more
Icon „Tailored for you“

„Tailored for you“

In this package, you have everything under control, including the cost of security testing. You determine the budget for testing

The testing budget is up to you
  • installation charge,
  • 20% Hacktrophy commission from rewards,
  • moderator fee
Find out more

Service package S

The package also includes a set up fee, bounties for ethical hackers and moderator services.

Who is it suitable for?

  • Simple websites and mobile applications with basic registration.
  • Online solutions that process only basic personal information such as name
    and email.

Within the package you will get:

  • Testing of IT security by a community of ethical hackers from around the world. Testing proceeds until the credit within the package is spent.
  • Possibility to define your own test objectives and testing procedures. We will help you set the appropriate amount of rewards for ethical hackers.
  • Detailed reports of security vulnerabilities found.
  • Support of a trained moderator who will manage your project and manually verify the reported security vulnerabilities.
  • After a credit for hacker rewards is spent, you can get another package at a discounted price.

Service package M

IMPORTANT!

Security vulnerability scan that we perform prior to launching the bug project bounty is a part of the package.

The package also includes a set up fee, bounties for ethical hackers and moderator services.

Who is it suitable for?

  • More complex business websites and mobile applications containing registration and various contact forms.
  • Websites that process multiple personal information (e.g., name, address, e-mail, phone number, birth number, ID number).
  • Simple e-shops.

Within the package you will get:

  • Scan of security vulnerabilities (without manual check of found ones). We’ll run a vulnerability scan before the start of your bug bounty program.
  • Testing of IT security by a community of ethical hackers from around the world. Testing proceeds until the credit within the package is spent.
  • Possibility to define your own test objectives and testing procedures. We will help you set the appropriate amount of rewards for ethical hackers.
  • Detailed reports of security vulnerabilities found.
  • Support of a trained moderator who will manage your project and manually verify the reported security vulnerabilities.
  • After a credit for hacker rewards is spent, you can get another package at a discounted price.

Service package L

IMPORTANT!

Security vulnerability scan that we perform prior to launching the bug project bounty is a part of the package.

The package also includes a set up fee, bounties for ethical hackers and moderator services.

Who is it suitable for?

  • Websites and mobile apps with a large amount of sensitive data such as payment and accounting data, health and project data, or company know-how.
  • Payment gateways and financial portals (exchanges, netbanking, etc.).
  • CRM and CMS systems, cloud, IoT devices, and enterprise interfaces.
  • Online infrastructures with sensitive databases.

Within the package you will get:

  • Scan of security vulnerabilities (including a manual check of found ones). We’ll run a vulnerability scan before the start of your bug bounty program.
  • Testing of IT security by a community of ethical hackers from around the world. Testing proceeds until the credit within the package is spent.
  • Possibility to define your own test objectives and testing procedures. We will help you set the appropriate amount of rewards for ethical hackers.
  • Detailed reports of security vulnerabilities found.
  • Support of a trained moderator who will manage your project and manually verify the reported security vulnerabilities.
  • After a credit for hacker rewards is spent, you can get another package at a discounted price.

Package „Tailored for you“

Suited for clients with individual requirements for online security testing and funding.

The testing budget is up to you
  • installation charge,
  • 20% Hacktrophy commission from rewards,
  • moderator fee

Who is it suitable for?

  • Companies that want to have a bug bounty program fully under their control.

Within the package you will get:

  • Full control over a bug bounty project including management and costs for security testing
  • Testing of IT security by a community of ethical hackers from around the world. Monthly budget for security testing
  • You pay only for real (verified) vulnerabilities.
  • A 20% commission for Hacktrophy is added to each hacker reward.
  • Possibility to manage bug bounty project.
  • If interested in the services of a moderator, we charge a fee.

Contact an expert

If you're not sure how to use Hacktrophy on your project or you have questions, we'd be happy to help. Talk to Hacktrophy expert.

  • Together we will find the best solution
  • We help you create a project
  • We are on the line throughout the project

Write us an email

[email protected]

Hear from us

fill in the form