Full cycle pentest reporting, automation, collaboration, and management platform. Simplify reporting by integrating tools, aggregate data during the project, collaborate with your teammates, reduce time, and provide better pentest services with Hexway Pentest SUite
YesWeHack is a leading Bug Bounty and Vulnerability Management Platform. Founded by ethical hackers in 2015, YesWeHack connects organisations worldwide to tens of thousands of ethical hackers, who uncover vulnerabilities in websites, mobile apps, connected devices and digital infrastructure.
Bug Bounty programs benefit from in-house triage, personalised support, a customisable model and results-based pricing. Clients include ZTE, Tencent, Swiss Post, Orange France and the French Ministry of Armed Forces.
The YesWeHack platform offers a range of integrated, API-based solutions: Bug Bounty (crowdsourcing vulnerability discovery); Vulnerability Disclosure Policy (creating and managing a secure channel for external vulnerability reporting); Pentest Management (managing pentest reports from all sources); Attack Surface Management (continuously mapping online exposure and detecting attack vectors); and ‘Dojo’ and YesWeHackEDU (ethical hacking training).
YesWeHack's services have ISO 27001 and ISO 27017 certifications, and its IT infrastructure is hosted by EU-based IaaS providers, compliant with the most stringent standards: ISO 27001 (+ 27017, 27018 & 27701), CSA STAR, SOC I/II Type 2 and PCI DSS.
Find out more at www.yeswehack.com
Hexway Hive's answer
It's a self-hosted solution with two separate workspaces for pentest teams and report receivers. Also, free-forever version is available
Hexway is a fast, effective platform, with a responsive design that facilitates the daily work of the pentester. Our clients had a good reception of Apiary, and the fully customizable reports.
The Hexway team adds features frequently and they have a quick response when there are problems.
Based on our record, Hexway Hive should be more popular than YesWeHack. It has been mentiond 3 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Try hexway.io/hive Red & Blue team workspaces w/ tool integrations and any project data imports. Source: about 2 years ago
Red Team projects have become a routine for many pentest companies quite a long time ago. In Hexway, we don’t do them a lot only because our main focus is on collaborative pentest platform for Red Team, Hive. But in this case, we couldn’t resist — the project seemed to be very promising. We won’t go into detail on the project itself but rather focus on one of its parts. Source: about 2 years ago
Hey! What tools do you use? Have you heard about hexway.io/hive ? Source: over 2 years ago
There are many resources online nowadays to learn security. You can do challenges on https://root-me.org, https://www.hackthebox.com/, https://overthewire.org/wargames/, etc. You can participate in security competitions (CTFs), see https://ctftime.org for a list of upcoming events. And finally if you are more interested in web security you can look for bugs on websites and get paid for it by https://hackerone.com... Source: over 1 year ago
AttackForge.com - AttackForge is the #1 Penetration Testing Management & Collaboration Platform for Enterprise. Bringing Security & Business Together On Your Pentesting Program.
HackerOne - HackerOne provides a platform designed to streamline vulnerability coordination and bug bounty program by enlisting hackers.
dradis - Dradis is the open-source reporting and collaboration tool for IT security professionals.
Bugcrowd - Harness the largest pool of curated and ranked security researchers to run the most efficient bug bounty and penetration tests
PlexTrac - Get up and running with the next generation platform for red and blue teams
Intigriti - Intigriti offers bug bounty and agile penetration testing solutions powered by Europe's #1 leading network of ethical hackers.