Submit your favorite resources for free.

Submit
LogoHackDB
  • Recent
  • Pricing
  • Submit
LogoHackDB

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  1. Home
  2. Items
  3. HackerOne
icon of HackerOne

HackerOne

HackerOne is a security platform that combines human expertise and AI to identify and address vulnerabilities in software.

Visit WebsiteShare on X
image of HackerOne
Visit Website

Introduction

Back

Information

  • Publisher
    Admin
  • Websitewww.hackerone.com
  • Created date04/14/2025
  • Published date04/15/2025

Categories

  • Certifications

Tags

  • Bug Bounty

More Resources

  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.
    image of DeepLearning.AI
    TrainingCertifications
    Visit Website

    DeepLearning.AI

    Details

    Offers online AI courses and certifications by Andrew Ng, helping individuals and organizations build AI skills and stay ahead in the industry.

    Training
    image of APIsec University
    API SecurityTrainingCertifications
    Visit Website

    APIsec University

    Details

    APIsec University offers free API security training courses to help you find API vulnerabilities and keep your APIs secure.

    TrainingAPICertifications
    image of GIAC GPEN
    CertificationsRed Team Operations
    Visit Website

    GIAC GPEN

    Details

    The GPEN certification validates a professional's ability to conduct penetration tests using best-practice techniques and methodologies.

    CertificationsTraining

    HackerOne is a comprehensive security platform designed to reduce the risk of security incidents by connecting organizations with a global community of trusted ethical hackers and providing AI-powered security solutions.

    Key Features:

    • Bug Bounty Programs: Leverage a vast network of security researchers to continuously test and identify vulnerabilities in your systems.
    • Vulnerability Disclosure Programs (VDP): Establish a clear and structured process for receiving and managing vulnerability reports from external sources.
    • Pentest as a Service (PTaaS): Access on-demand penetration testing services with programmatic and scalable testing methodologies.
    • AI Red Teaming: Evaluate the safety and security of AI systems through specialized testing and analysis.
    • Code Review: Expert code review and guidance to identify vulnerabilities early in the development lifecycle.
    • Challenge: Time-bound offensive testing events to quickly discover critical vulnerabilities.

    Use Cases:

    • Continuous Security Testing: Implement ongoing security assessments to identify and address vulnerabilities proactively.
    • Vulnerability Management: Streamline the process of discovering, prioritizing, and remediating vulnerabilities.
    • Cloud Security: Secure cloud environments with specialized testing and vulnerability management.
    • AI Security: Ensure the safety and security of AI-powered applications and systems.