Do you want to be part of the community?
Do You Want The Best Professionals?
About the Platform
The companies publish their programs
The assets that companies need to protect will be published from their private platform. from its private platform. The company will have a streamlined process optimised process, which will make it possible to facilitate and delimit the programme according to their needs in a comprehensive manner.
The hunters experts will look for vulnerabilities
The programme will be accessible to the expert community best suited to the needs of the programme. best suited to the needs of the programme. The best hunters in each will provide their expertise in the search for vulnerabilities in the asset. asset.
It generates an appropriate report for the company
Each time a vulnerability is found, it is reported through the platform in professional the platform as a professional report for verification. The platform itself facilitates this process in order to guarantee the highest quality of the results delivered.
The hunter is rewarded for every vulnerability found
If the vulnerability exists and has been validated with the requirements of the the hunter receives the corresponding reward for his work. work. In this way the company only pays for the vulnerabilities found, and the hunter is rewarded according to the success of his appropriate to the success of his participation in the programme.
The opportunity to optimize your cybersecurity with epic bounties.
It will only consume budget by adding new identified vulnerabilities identified.
Allows to adjust
By regulating the number of participating researchers, the search can be accelerated to the maximum.
Select vulnerabilities in a fully customisable way and real vulnerabilities.
Real Time Results
The results are applicable in real time the moment a vulnerability is found.
Jose Ramon Palanco
Serial Cybersecurity entrepreneur and Researcher
Estrategic, Innovation and Community advisor. DragonJAR Founder.
Entrepreneur and passionate about technology and cybersecurity
Projects of various kinds where I am in charge of monitoring the Business Plan, Budget and other strategic areas of the different businesses. Cost analysis, project feasibility, purchase control, etc.
Leading the Marketing area with a great team
Main keys in a bug bounty program
Bug bounty programs are a pay-for-performance approach to proactive security testing designed to maximize the discovery of high-impact vulnerabilities in organizations.Read more
Vulnerability disclosure program. Why is it so important for CISOS?
What is a vulnerability disclosure program? A Vulnerability disclosure program (VDP) is a proces...Read more
Three common ways in which organizations are hacked
When it comes to security teams, one of the highest priorities is to reduce risk. An important pa...Read more
Why trust hunters
One of the most common questions we encounter in conversations around bug bounty programs is “Why...Read more
I'm a customer
I'm a hunter