findbug.io Open in urlscan Pro
2a06:98c1:3120::3  Public Scan

Submitted URL: http://xq5xu.mjt.lu/lnk/AUsAABkM7nYAAAAAEsIAAAC2_OIAAAAADAsAABJLABZpqwBfz5gLiFO4t384SN6a22bpGh2QWQAWFAo/1/dCxUuEK9Em...
Effective URL: https://findbug.io/
Submission Tags: falconsandbox
Submission: On July 01 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

POST /#wpcf7-f1648-p980-o2

<form action="/#wpcf7-f1648-p980-o2" method="post" class="wpcf7-form init" novalidate="novalidate" data-status="init">
  <div style="display: none;">
    <input type="hidden" name="_wpcf7" value="1648">
    <input type="hidden" name="_wpcf7_version" value="5.3.2">
    <input type="hidden" name="_wpcf7_locale" value="en_US">
    <input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f1648-p980-o2">
    <input type="hidden" name="_wpcf7_container_post" value="980">
    <input type="hidden" name="_wpcf7_posted_data_hash" value="">
    <input type="hidden" name="_wpcf7_recaptcha_response"
      value="03AGdBq26cJk0QQZ1xEOs6nPc2EHAkBPDcvy_ye24wmb5ctDRiRyaNUUH8aJQ3813Tdf0V5brzgbRVpj4HK6tWHlQ-CTqo3EPq0I11L1D36_bcFQGcPSUavn9hQf6aZRknIKpC_CiIV4jiH_Hrus6eVGsBEzIUEtXf1NNlBGk65xEz_cZTOYRmBrl38xGe-KH2OhMK_kTBYv_VdDRODqxMj6qmfq5LRG1gU2ylrZIlhE4FkjFZTKF0fZdrB6FtvsRAWbo8D_yTYlcQDe7lEP9N5f3nKElCPigKQhwnIYGGrnvDR7wKtbcDAq8c0v5oUXrWV17fzRxVYcMYnx5FlxlSbDh8IY_bNXcr2Z0iOCRbNYFVIJDyzn_tuJ-pVk9O_P6goPZEZD_X0yDl-jUvnj3mLSU7w1ds3yxUn2uh_2hSiHmBoTXnFwsql6NFQGz2X_bT_40oLoHcb2VKE1RFePQbmcj03EpSmt0Ibg">
  </div>
  <p>
  </p>
  <p>Subscribe FindBUG for better Cyber Security</p>
  <p><br>
    <br><br>
    <br><br>
    <label></label><br>
    <label>*Your Full Name</label><br>
    <span class="wpcf7-form-control-wrap your-name"><input type="text" name="your-name" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"></span>
  </p>
  <p><label>*Your Email</label><br>
    <span class="wpcf7-form-control-wrap your-email"><input type="email" name="your-email" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email" aria-required="true"
        aria-invalid="false"></span>
  </p>
  <p><label>*Phone Number</label><br>
    <span class="wpcf7-form-control-wrap tel"><input type="tel" name="tel" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-tel wpcf7-validates-as-required wpcf7-validates-as-tel" aria-required="true" aria-invalid="false"></span>
  </p>
  <p><label>*Company/Organisation</label><br>
    <span class="wpcf7-form-control-wrap your-subject"><input type="text" name="your-subject" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"></span>
  </p>
  <p><label>*Your Job Position</label><br>
    <span class="wpcf7-form-control-wrap position"><input type="text" name="position" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"></span>
  </p>
  <p><label>Before submit I have read and accept <a href="https://findbug.io/terms-conditions/" target="_blank">Terms&amp;Conditions</a>! </label><br>
    <label></label>
  </p>
  <p><input type="submit" value="Send" class="wpcf7-form-control wpcf7-submit"><span class="ajax-loader"></span></p>
  <input type="hidden" class="wpcf7-pum" value="{&quot;closepopup&quot;:true,&quot;closedelay&quot;:1,&quot;openpopup&quot;:false,&quot;openpopup_id&quot;:0}">
  <div class="wpcf7-response-output" aria-hidden="true"></div>
</form>

POST /#wpcf7-f1648-o1

<form action="/#wpcf7-f1648-o1" method="post" class="wpcf7-form init" novalidate="novalidate" data-status="init">
  <div style="display: none;">
    <input type="hidden" name="_wpcf7" value="1648">
    <input type="hidden" name="_wpcf7_version" value="5.3.2">
    <input type="hidden" name="_wpcf7_locale" value="en_US">
    <input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f1648-o1">
    <input type="hidden" name="_wpcf7_container_post" value="0">
    <input type="hidden" name="_wpcf7_posted_data_hash" value="">
    <input type="hidden" name="_wpcf7_recaptcha_response"
      value="03AGdBq26cJk0QQZ1xEOs6nPc2EHAkBPDcvy_ye24wmb5ctDRiRyaNUUH8aJQ3813Tdf0V5brzgbRVpj4HK6tWHlQ-CTqo3EPq0I11L1D36_bcFQGcPSUavn9hQf6aZRknIKpC_CiIV4jiH_Hrus6eVGsBEzIUEtXf1NNlBGk65xEz_cZTOYRmBrl38xGe-KH2OhMK_kTBYv_VdDRODqxMj6qmfq5LRG1gU2ylrZIlhE4FkjFZTKF0fZdrB6FtvsRAWbo8D_yTYlcQDe7lEP9N5f3nKElCPigKQhwnIYGGrnvDR7wKtbcDAq8c0v5oUXrWV17fzRxVYcMYnx5FlxlSbDh8IY_bNXcr2Z0iOCRbNYFVIJDyzn_tuJ-pVk9O_P6goPZEZD_X0yDl-jUvnj3mLSU7w1ds3yxUn2uh_2hSiHmBoTXnFwsql6NFQGz2X_bT_40oLoHcb2VKE1RFePQbmcj03EpSmt0Ibg">
  </div>
  <p>
  </p>
  <p>Subscribe FindBUG for better Cyber Security</p>
  <p><br>
    <br><br>
    <br><br>
    <label></label><br>
    <label>*Your Full Name</label><br>
    <span class="wpcf7-form-control-wrap your-name"><input type="text" name="your-name" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"></span>
  </p>
  <p><label>*Your Email</label><br>
    <span class="wpcf7-form-control-wrap your-email"><input type="email" name="your-email" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email" aria-required="true"
        aria-invalid="false"></span>
  </p>
  <p><label>*Phone Number</label><br>
    <span class="wpcf7-form-control-wrap tel"><input type="tel" name="tel" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-tel wpcf7-validates-as-required wpcf7-validates-as-tel" aria-required="true" aria-invalid="false"></span>
  </p>
  <p><label>*Company/Organisation</label><br>
    <span class="wpcf7-form-control-wrap your-subject"><input type="text" name="your-subject" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"></span>
  </p>
  <p><label>*Your Job Position</label><br>
    <span class="wpcf7-form-control-wrap position"><input type="text" name="position" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"></span>
  </p>
  <p><label>Before submit I have read and accept <a href="https://findbug.io/terms-conditions/" target="_blank">Terms&amp;Conditions</a>! </label><br>
    <label></label>
  </p>
  <p><input type="submit" value="Send" class="wpcf7-form-control wpcf7-submit"><span class="ajax-loader"></span></p>
  <input type="hidden" class="wpcf7-pum" value="{&quot;closepopup&quot;:true,&quot;closedelay&quot;:1,&quot;openpopup&quot;:false,&quot;openpopup_id&quot;:0}">
  <div class="wpcf7-response-output" aria-hidden="true"></div><input type="hidden" name="pum_form_popup_id" value="1692">
</form>

Text Content

 * ABOUT
 * SERVICE
 * HACKERS
 * HOW IT WORKS
 * IN THE NEWS
 * BLOG

Login
Sign up

 * ABOUT
 * SERVICE
 * HACKERS
 * HOW IT WORKS
 * IN THE NEWS
 * BLOG

Login Sign up



MOST TRUSTED HACKERSARE WILLING TO HELP SMART COMPANIES

TOP skilled security professionals over 20+ countries are connected to support
companies on Crowd-sourced PenTesting, Bug Bounty, GDPR compliance and
Employment. Give at minimum 300% more protection on your digital properties.


I'm an Ethical Hacker I'm a Business


ABOUT


FINDBUG THE NEWEST ACTOR ON ETHICAL HACKING AS A SERVICE

Our internal team is globally acknowledged for reporting security
vulnerabilities and listed in hall-of-fame on Fortune 500 companies like:
Microsoft, Facebook, Nokia, IKEA, Adobe, Dell, Apple, US Department of Defense,
BMW Group, Daimler and hundred of more.

A decade experience in industry working for LEA and big companies.

Community builder and cyber influencers

Tens of professional certifications, 100+ training's




ABOUT


IDENTIFY YOUR SECURITY VULNERABILITIES WITH CROWD SECURITY SOLUTIONS

Have you thought why companies like Google, Microsoft, Ebay, Paypal are
worldwide most secure platforms. By their own bug bounty programs call
then-after reward hackers for reporting security issues on their systems. We
offer user friendly bug bounty for every single company no matter size and the
budget. Our highly skilled security professionals would help you go step
forward. Give them a chance. More eyes for better security.

Add Your Own Programs Each program is either managed by the our team or run by
company peer2peer.

Define Your Scope The scope defines what applications/services they will take
submissions, pre-defined rules, scanning-time, accepted reports of
vulnerabilities.

Choose Your Privacy For all of your programs you can choose to become (PRIVATE)
only for invited hackers or (PUBLIC) for all hackers that are registered.




HOW TO


GET INVOLVED


I'M ETHICAL HACKER

I own hacking skills and I want to put my knowledge to build better cyber
environment, earn some easy money and get promoted.

Sign Up


I OWN A BUSINESS

Usually I'm busy with business strategies and product development. I want to be
sure that no-one can damage my reputation and put me on risk.

Sign Up


GOVERNMENT

We have been working for Law Enforcement Agencies for a decades while helping
them protect their critical infrastructure. Within our heroes we provide
national cyber security shield.

Contact Us


I'M CYBER RECRUITER

I'm seeking for potential Cyber Security professionals interested on new job
opportunities. FindBug provides statistical analysis, including recommendation
and proven records to help you on selection process.

Contact Us

CUSTOMER


TESTEMONIALS

Ruzhdi Kurtishaj
CEO at Sharr Travel

> “First sceptic thereafter fascinated! Vulnerabilities reported, saved my core
> business on online booking for my travel agency“

Hajrush Lenjani
CEO at TheBigOff.com

> “IT services today are running the world, being in the field and not being
> wary of cyber attacks is professional suicide. We are very happy as
> “THEBIGOFF.COM” that we have such a good cooperation with FINDBUG, this gives
> us the comfort of being safe, no price for it“

Bardhyl Bytyqi
Founder at UMMAH

> “Aiming to be a leading global mobile platform brand for the Muslim community,
> we as Ummah are committed to providing sustainable & reliable services and
> always keeping our platform secure and safe. We have been lucky to partner
> with FINDBUG by utilizing the enormous community of security professionals and
> let us keep our focus on developing the product.“

Admir Kadriu
CTO of DUA.com

> “FINDBUG provided to us “Mobile & API Penetration Testing”.In a short notice
> FINDBUG was able to organize a great team of security experts which worked
> very hard to deliver the security report to us before we launched the
> application. Except penetration testing they supported us on quality assurance
> also, which we really appreciate.“



OUR WAY


ROAD MAP

January 2015

Joined 50 hats

January 2016

+30 more hats

December 2016

FindBUG was established

February 2017

Research & Building model

June 2019

New release, Launch!

Now

Making the world a safer place



HACKERS


HOW IT WORKS


SIGNUP AS HACKER


VERIFICATION PROCESS


FINDBUG'S AND REPORT


GET REWARDED



OUR ETHICAL


HACKERS

Over the years we selected out of the box thinkers from Universities and High
School to help government and companies uncovering their security
vulnerabilities. This year we hosted the 5th edition of 'THE DAY WHEN HACKING IS
LEGAL' hackathon to meet them in person. Start your journey now!


ÇLIRIM EMINI

FINDBUG is wonderful bug bounty platform, help youngsters get motivated, hack
for fun and earn good money. I’m the winner of the 5th contest ‘The day when
hacking is legal’ except I was paid for bounty I got 3 more year scholarship
from the university I reported vulnerabilities.


GENTRIT XHEMA

I’m so happy with FINDBUG, they are doing a great job on security awareness, bug
bounties and responsible disclosure. Can’t wait for more scope to scan. I’m the
2nd place winner on ‘THE DAY WHEN HACKING IS LEGAL V’ hackathon.


BECOME A HACKER

The platform is user friendly and well designed for security engineers. Be aware
that you cannot sign-up as a hacker just filling a sign-up form, the puzzle with
hidden confirmation code to finish signup process makes the game more fun.

OUR DATA


STATISTIC OVER 24H

We published white papers on hackers behavior, how and when they started, how
they improve out of box thinking skills and much more. We understand their
language, and business needs too.
Their founding over three previous 8h bootcamps have been shared with numbers.
Our experienced advice:

Do not punish, reward!
Invest on Information Security
Choose Crowd Security not individuals
You decide for budget, not others

Bugs Reported
225
Companies Secured
23
Budget spend
15000
€
Hackers stimulated
96
%

FAQ


FREQUENCY ASKED QUESTIONS


WHAT IS HACKER TRUST?

Hacker Trust is a formula invented by FindBUG to determine which Hacker is the
most trustworthy and valuable based on some parameters that we take into
consideration. Some of them are Sign UP CTF / Identity Verification / TDWHL /
Bug Accuracy.


WHAT IS PROGRAM STRENGTH?

Program Strength is basically a way to determine the complexity of a program
based on a internal questionnaire that FindBug asks companies that want to join
our platform. This questionnaire will determine which the best way to pay
security researchers that want to report to your program. But also security
researchers will be able to know how much complex is a specific program.


DIFFERENCE BETWEEN PUBLIC AND PRIVATE PROGRAMS?

The main difference is on hackers involved, when you go public all of our
registered ethical hackers can view your program otherwise Private Programs you
can decide security researchers you want to involve based on their Hacker Trust,
Ranks and Skills.


WHAT ABOUT SKILL ENDORSEMENT?

Skills Endorsements a feature not seen before on bug bounties allows companies
to endorse Plisa Hackers based on their technical skills. Through this companies
can determine which is the most suitable for their program. Researchers will
have the same ability to endorse each other. The researcher will be able to
select up to 5 skills


HOW TO ADD A PROGRAM?

You can create a program through our the button “Add Program” which is linked to
your account plan. You will have 5 steps that you need to complete in order to
send your application to FindBUG which will be reviewed within a couple of
working days.


WHO ARE PLISA HACKERS?

Plisa Hackers are regular security researchers that finds vulnerabilities and
report them through FindBUG platform. We call them “Plisa” because the word
“Plisa” roots from Albanian tradition which is a symbol of a white hat that was
used since time of Illyrians in the Balkans. And we connect “Plisa Hackers” to
“White Hat Hackers”


Skills


HACK TO L|EARN, PROTECT AND GET ACKNOWLEDGED

Dear Hacker,
Based on our experience we developed user friendly bug bounty that is hacker
oriented. All we need is your positive energy to support companies that trusted
us.
``white HAT for white LIFE``




PRESS ABOUT US


PRESS

“Among a thousand of applicants our start-up have been selected on TOP5 most
promising start-up of 2018 from the Ministry of Innovation and Enterpreneurship”

“ Findbug have been selected to present on biggest CEE conference Wolves Summit
2019, let's meet on March and talk”



"FindBUG LLC is selected to Startup Turkey Top 100 Demo Day. More than 150
countries, 120.000 startup applications. Only 1% is approved to join the Startup
Turkey full program on 26-29 April in Istanbul, including pitching on the main
stage"



“GovTech.Pioneers 2019 takes place on April 2nd, 2019 in Vienna. Programs for
both Seed and Series A startups, FindBUG is among selected ones”

‹›



HOW IT WORKS FOR


COMPANIES


SIGNUP AS BUSINESS


CHOOSE PRIVACY


RECEIVE REPORTS


FIX THEM


REWARD HACKERS



IN THE WORLD


LATEST NEWS

Findbug News / Hacker News


WIPER MALWARE CALLED “CORONAVIRUS” SPREADS AMONG WINDOWS VICTIMS

Wiper Malware Called “Coronavirus” Spreads Among Windows Victims Like NotPetya,
it overwrites the master boot record to render computers “trashed.” A new
Windows malware has emerged that makes disks unusable by overwriting the master
boot record (MBR). It takes its...

April 4, 2020
Findbug News


SKYPE FLAW GRANTS ACCESS TO THE PHOTOS ON YOUR ANDROID PHONE WITHOUT A PASSCODE!

A design flaw in Microsoft’s Skype app can be exploited to grant access to the
data on your Android phone without passcode authentication, a researcher has
shown. Kosovo-based bug-hunter Florian Kunushevci demonstrates in the YouTube
video below how Skype can...

March 2, 2019
Findbug News


THE 4 TYPES OF CYBERSECURITY THREATS AND A FORMULA TO FIGHT THEM

Wells Fargo’s chief information security officer Rich Baich has to be very
strategic about the way he spends his budget in order to protect the bank from
the endless stream of cyberattacks launched at it every day. At the 2017
Borderless...

February 23, 2019
Findbug News


3-RD WORKSHOP OF “THE DAY WHEN HACKING IS LEGAL”

The International Conference on Cyber Security and Privacy will bring tremendous
innovation from the field of online security and privacy. On February 2 there is
a rare and unique opportunity for Kosovo and the Region. “The Day When Hacking
is...

February 22, 2019
‹›


Subscribe FindBUG for better Cyber Security







*Your Full Name


*Your Email


*Phone Number


*Company/Organisation


*Your Job Position


Before submit I have read and accept Terms&Conditions!







OUR GLOBAL


PARTNERS



USA: 9040, South Rita Road, Tech Parks Arizona, Tucson Arizona, USA 85747
Kosovo: Str. Zeki Shulemaja 1st Floor, 10000 Prishtina, Republic of Kosovo


About
Service
Hackers
How it Works
Blog
Terms & Conditions
WhitePapers
Privacy Policy
Business Profile

© 2019, FindBUG.io supported by MIN

GET IN TOUCH

————————————————-

Subscribe FindBUG for better Cyber Security







*Your Full Name


*Your Email


*Phone Number


*Company/Organisation


*Your Job Position


Before submit I have read and accept Terms&Conditions!





×