findbug.io
Open in
urlscan Pro
2a06:98c1:3120::a
Public Scan
Submitted URL: http://xq5xu.mjt.lu/lnk/AUsAABkM7nYAAAAAEsIAAAC2_OIAAAAADAsAABJLABZpqwBfz5gLiFO4t384SN6a22bpGh2QWQAWFAo/1/dCxUuEK9Em...
Effective URL: https://findbug.io/
Submission Tags: falconsandbox
Submission: On May 18 via api from US — Scanned from DE
Effective URL: https://findbug.io/
Submission Tags: falconsandbox
Submission: On May 18 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMPOST /#wpcf7-f1648-p980-o2
<form action="/#wpcf7-f1648-p980-o2" method="post" class="wpcf7-form init" novalidate="novalidate" data-status="init">
<div style="display: none;">
<input type="hidden" name="_wpcf7" value="1648">
<input type="hidden" name="_wpcf7_version" value="5.3.2">
<input type="hidden" name="_wpcf7_locale" value="en_US">
<input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f1648-p980-o2">
<input type="hidden" name="_wpcf7_container_post" value="980">
<input type="hidden" name="_wpcf7_posted_data_hash" value="">
<input type="hidden" name="_wpcf7_recaptcha_response"
value="03AGdBq26ToFbVt7WUa2Uo75m8ERDfkqn01hm4et9fUAZ0tDnZQw4AUUm8Quwcdp1VPC8vR3TTpYDrxwXH5r2ZDUk2dT--KyNjq5n6ZIss9579ppCXSY5kSoMEFsqBqeYTvFa8Gt7kFFrlSEIn5yvVVvs2xjo0Ai2ANJYMt8o7WHArH3t9s2NKz2zyY-_LVQSxHrMo0wtVzQKp19NRHoHs-K4Cc0rlnT6Xirtp5JfFINnNtpunWjmobOS6NxrHYRgK6bKLsyiYSBTLhtkwlME1ns5vmvCFPx9N6bmrAwolH5M-qDYrek9phZBtWJwDbot727BWAvzbGhot0K0xafEbWeoffXrNSaE63QSfXF0FD_B8iLrBVAV_NDcaPFxP7oPMXvPUUskL-Tu1NJXaNCD9xky2A3vFU3oaQfrBXUBcqwtd_qXBP8NREILCNTC0O-9-zpvyyUIW7Ri9lHkzRzu1Bk0nQ6pl2WIf_A">
</div>
<p>
</p>
<p>Subscribe FindBUG for better Cyber Security</p>
<p><br>
<br><br>
<br><br>
<label></label><br>
<label>*Your Full Name</label><br>
<span class="wpcf7-form-control-wrap your-name"><input type="text" name="your-name" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"></span>
</p>
<p><label>*Your Email</label><br>
<span class="wpcf7-form-control-wrap your-email"><input type="email" name="your-email" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email" aria-required="true"
aria-invalid="false"></span>
</p>
<p><label>*Phone Number</label><br>
<span class="wpcf7-form-control-wrap tel"><input type="tel" name="tel" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-tel wpcf7-validates-as-required wpcf7-validates-as-tel" aria-required="true" aria-invalid="false"></span>
</p>
<p><label>*Company/Organisation</label><br>
<span class="wpcf7-form-control-wrap your-subject"><input type="text" name="your-subject" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"></span>
</p>
<p><label>*Your Job Position</label><br>
<span class="wpcf7-form-control-wrap position"><input type="text" name="position" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"></span>
</p>
<p><label>Before submit I have read and accept <a href="https://findbug.io/terms-conditions/" target="_blank">Terms&Conditions</a>! </label><br>
<label></label>
</p>
<p><input type="submit" value="Send" class="wpcf7-form-control wpcf7-submit"><span class="ajax-loader"></span></p>
<input type="hidden" class="wpcf7-pum" value="{"closepopup":true,"closedelay":1,"openpopup":false,"openpopup_id":0}">
<div class="wpcf7-response-output" aria-hidden="true"></div>
</form>
POST /#wpcf7-f1648-o1
<form action="/#wpcf7-f1648-o1" method="post" class="wpcf7-form init" novalidate="novalidate" data-status="init">
<div style="display: none;">
<input type="hidden" name="_wpcf7" value="1648">
<input type="hidden" name="_wpcf7_version" value="5.3.2">
<input type="hidden" name="_wpcf7_locale" value="en_US">
<input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f1648-o1">
<input type="hidden" name="_wpcf7_container_post" value="0">
<input type="hidden" name="_wpcf7_posted_data_hash" value="">
<input type="hidden" name="_wpcf7_recaptcha_response"
value="03AGdBq26ToFbVt7WUa2Uo75m8ERDfkqn01hm4et9fUAZ0tDnZQw4AUUm8Quwcdp1VPC8vR3TTpYDrxwXH5r2ZDUk2dT--KyNjq5n6ZIss9579ppCXSY5kSoMEFsqBqeYTvFa8Gt7kFFrlSEIn5yvVVvs2xjo0Ai2ANJYMt8o7WHArH3t9s2NKz2zyY-_LVQSxHrMo0wtVzQKp19NRHoHs-K4Cc0rlnT6Xirtp5JfFINnNtpunWjmobOS6NxrHYRgK6bKLsyiYSBTLhtkwlME1ns5vmvCFPx9N6bmrAwolH5M-qDYrek9phZBtWJwDbot727BWAvzbGhot0K0xafEbWeoffXrNSaE63QSfXF0FD_B8iLrBVAV_NDcaPFxP7oPMXvPUUskL-Tu1NJXaNCD9xky2A3vFU3oaQfrBXUBcqwtd_qXBP8NREILCNTC0O-9-zpvyyUIW7Ri9lHkzRzu1Bk0nQ6pl2WIf_A">
</div>
<p>
</p>
<p>Subscribe FindBUG for better Cyber Security</p>
<p><br>
<br><br>
<br><br>
<label></label><br>
<label>*Your Full Name</label><br>
<span class="wpcf7-form-control-wrap your-name"><input type="text" name="your-name" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"></span>
</p>
<p><label>*Your Email</label><br>
<span class="wpcf7-form-control-wrap your-email"><input type="email" name="your-email" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email" aria-required="true"
aria-invalid="false"></span>
</p>
<p><label>*Phone Number</label><br>
<span class="wpcf7-form-control-wrap tel"><input type="tel" name="tel" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-tel wpcf7-validates-as-required wpcf7-validates-as-tel" aria-required="true" aria-invalid="false"></span>
</p>
<p><label>*Company/Organisation</label><br>
<span class="wpcf7-form-control-wrap your-subject"><input type="text" name="your-subject" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"></span>
</p>
<p><label>*Your Job Position</label><br>
<span class="wpcf7-form-control-wrap position"><input type="text" name="position" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"></span>
</p>
<p><label>Before submit I have read and accept <a href="https://findbug.io/terms-conditions/" target="_blank">Terms&Conditions</a>! </label><br>
<label></label>
</p>
<p><input type="submit" value="Send" class="wpcf7-form-control wpcf7-submit"><span class="ajax-loader"></span></p>
<input type="hidden" class="wpcf7-pum" value="{"closepopup":true,"closedelay":1,"openpopup":false,"openpopup_id":0}">
<div class="wpcf7-response-output" aria-hidden="true"></div><input type="hidden" name="pum_form_popup_id" value="1692">
</form>
Text Content
* ABOUT * SERVICE * HACKERS * HOW IT WORKS * IN THE NEWS * BLOG Login Sign up * ABOUT * SERVICE * HACKERS * HOW IT WORKS * IN THE NEWS * BLOG Login Sign up MOST TRUSTED HACKERSARE WILLING TO HELP SMART COMPANIES TOP skilled security professionals over 20+ countries are connected to support companies on Crowd-sourced PenTesting, Bug Bounty, GDPR compliance and Employment. Give at minimum 300% more protection on your digital properties. I'm an Ethical Hacker I'm a Business ABOUT FINDBUG THE NEWEST ACTOR ON ETHICAL HACKING AS A SERVICE Our internal team is globally acknowledged for reporting security vulnerabilities and listed in hall-of-fame on Fortune 500 companies like: Microsoft, Facebook, Nokia, IKEA, Adobe, Dell, Apple, US Department of Defense, BMW Group, Daimler and hundred of more. A decade experience in industry working for LEA and big companies. Community builder and cyber influencers Tens of professional certifications, 100+ training's ABOUT IDENTIFY YOUR SECURITY VULNERABILITIES WITH CROWD SECURITY SOLUTIONS Have you thought why companies like Google, Microsoft, Ebay, Paypal are worldwide most secure platforms. By their own bug bounty programs call then-after reward hackers for reporting security issues on their systems. We offer user friendly bug bounty for every single company no matter size and the budget. Our highly skilled security professionals would help you go step forward. Give them a chance. More eyes for better security. Add Your Own Programs Each program is either managed by the our team or run by company peer2peer. Define Your Scope The scope defines what applications/services they will take submissions, pre-defined rules, scanning-time, accepted reports of vulnerabilities. Choose Your Privacy For all of your programs you can choose to become (PRIVATE) only for invited hackers or (PUBLIC) for all hackers that are registered. HOW TO GET INVOLVED I'M ETHICAL HACKER I own hacking skills and I want to put my knowledge to build better cyber environment, earn some easy money and get promoted. Sign Up I OWN A BUSINESS Usually I'm busy with business strategies and product development. I want to be sure that no-one can damage my reputation and put me on risk. Sign Up GOVERNMENT We have been working for Law Enforcement Agencies for a decades while helping them protect their critical infrastructure. Within our heroes we provide national cyber security shield. Contact Us I'M CYBER RECRUITER I'm seeking for potential Cyber Security professionals interested on new job opportunities. FindBug provides statistical analysis, including recommendation and proven records to help you on selection process. Contact Us CUSTOMER TESTEMONIALS Ruzhdi Kurtishaj CEO at Sharr Travel > “First sceptic thereafter fascinated! Vulnerabilities reported, saved my core > business on online booking for my travel agency“ Hajrush Lenjani CEO at TheBigOff.com > “IT services today are running the world, being in the field and not being > wary of cyber attacks is professional suicide. We are very happy as > “THEBIGOFF.COM” that we have such a good cooperation with FINDBUG, this gives > us the comfort of being safe, no price for it“ Bardhyl Bytyqi Founder at UMMAH > “Aiming to be a leading global mobile platform brand for the Muslim community, > we as Ummah are committed to providing sustainable & reliable services and > always keeping our platform secure and safe. We have been lucky to partner > with FINDBUG by utilizing the enormous community of security professionals and > let us keep our focus on developing the product.“ Admir Kadriu CTO of DUA.com > “FINDBUG provided to us “Mobile & API Penetration Testing”.In a short notice > FINDBUG was able to organize a great team of security experts which worked > very hard to deliver the security report to us before we launched the > application. Except penetration testing they supported us on quality assurance > also, which we really appreciate.“ OUR WAY ROAD MAP January 2015 Joined 50 hats January 2016 +30 more hats December 2016 FindBUG was established February 2017 Research & Building model June 2019 New release, Launch! Now Making the world a safer place HACKERS HOW IT WORKS SIGNUP AS HACKER VERIFICATION PROCESS FINDBUG'S AND REPORT GET REWARDED OUR ETHICAL HACKERS Over the years we selected out of the box thinkers from Universities and High School to help government and companies uncovering their security vulnerabilities. This year we hosted the 5th edition of 'THE DAY WHEN HACKING IS LEGAL' hackathon to meet them in person. Start your journey now! ÇLIRIM EMINI FINDBUG is wonderful bug bounty platform, help youngsters get motivated, hack for fun and earn good money. I’m the winner of the 5th contest ‘The day when hacking is legal’ except I was paid for bounty I got 3 more year scholarship from the university I reported vulnerabilities. GENTRIT XHEMA I’m so happy with FINDBUG, they are doing a great job on security awareness, bug bounties and responsible disclosure. Can’t wait for more scope to scan. I’m the 2nd place winner on ‘THE DAY WHEN HACKING IS LEGAL V’ hackathon. BECOME A HACKER The platform is user friendly and well designed for security engineers. Be aware that you cannot sign-up as a hacker just filling a sign-up form, the puzzle with hidden confirmation code to finish signup process makes the game more fun. OUR DATA STATISTIC OVER 24H We published white papers on hackers behavior, how and when they started, how they improve out of box thinking skills and much more. We understand their language, and business needs too. Their founding over three previous 8h bootcamps have been shared with numbers. Our experienced advice: Do not punish, reward! Invest on Information Security Choose Crowd Security not individuals You decide for budget, not others Bugs Reported 225 Companies Secured 23 Budget spend 15000 € Hackers stimulated 96 % FAQ FREQUENCY ASKED QUESTIONS WHAT IS HACKER TRUST? Hacker Trust is a formula invented by FindBUG to determine which Hacker is the most trustworthy and valuable based on some parameters that we take into consideration. Some of them are Sign UP CTF / Identity Verification / TDWHL / Bug Accuracy. WHAT IS PROGRAM STRENGTH? Program Strength is basically a way to determine the complexity of a program based on a internal questionnaire that FindBug asks companies that want to join our platform. This questionnaire will determine which the best way to pay security researchers that want to report to your program. But also security researchers will be able to know how much complex is a specific program. DIFFERENCE BETWEEN PUBLIC AND PRIVATE PROGRAMS? The main difference is on hackers involved, when you go public all of our registered ethical hackers can view your program otherwise Private Programs you can decide security researchers you want to involve based on their Hacker Trust, Ranks and Skills. WHAT ABOUT SKILL ENDORSEMENT? Skills Endorsements a feature not seen before on bug bounties allows companies to endorse Plisa Hackers based on their technical skills. Through this companies can determine which is the most suitable for their program. Researchers will have the same ability to endorse each other. The researcher will be able to select up to 5 skills HOW TO ADD A PROGRAM? You can create a program through our the button “Add Program” which is linked to your account plan. You will have 5 steps that you need to complete in order to send your application to FindBUG which will be reviewed within a couple of working days. WHO ARE PLISA HACKERS? Plisa Hackers are regular security researchers that finds vulnerabilities and report them through FindBUG platform. We call them “Plisa” because the word “Plisa” roots from Albanian tradition which is a symbol of a white hat that was used since time of Illyrians in the Balkans. And we connect “Plisa Hackers” to “White Hat Hackers” Skills HACK TO L|EARN, PROTECT AND GET ACKNOWLEDGED Dear Hacker, Based on our experience we developed user friendly bug bounty that is hacker oriented. All we need is your positive energy to support companies that trusted us. ``white HAT for white LIFE`` PRESS ABOUT US PRESS “Among a thousand of applicants our start-up have been selected on TOP5 most promising start-up of 2018 from the Ministry of Innovation and Enterpreneurship” “ Findbug have been selected to present on biggest CEE conference Wolves Summit 2019, let's meet on March and talk” "FindBUG LLC is selected to Startup Turkey Top 100 Demo Day. More than 150 countries, 120.000 startup applications. Only 1% is approved to join the Startup Turkey full program on 26-29 April in Istanbul, including pitching on the main stage" “GovTech.Pioneers 2019 takes place on April 2nd, 2019 in Vienna. Programs for both Seed and Series A startups, FindBUG is among selected ones” ‹› HOW IT WORKS FOR COMPANIES SIGNUP AS BUSINESS CHOOSE PRIVACY RECEIVE REPORTS FIX THEM REWARD HACKERS IN THE WORLD LATEST NEWS Findbug News / Hacker News WIPER MALWARE CALLED “CORONAVIRUS” SPREADS AMONG WINDOWS VICTIMS Wiper Malware Called “Coronavirus” Spreads Among Windows Victims Like NotPetya, it overwrites the master boot record to render computers “trashed.” A new Windows malware has emerged that makes disks unusable by overwriting the master boot record (MBR). It takes its... April 4, 2020 Findbug News SKYPE FLAW GRANTS ACCESS TO THE PHOTOS ON YOUR ANDROID PHONE WITHOUT A PASSCODE! A design flaw in Microsoft’s Skype app can be exploited to grant access to the data on your Android phone without passcode authentication, a researcher has shown. Kosovo-based bug-hunter Florian Kunushevci demonstrates in the YouTube video below how Skype can... March 2, 2019 Findbug News THE 4 TYPES OF CYBERSECURITY THREATS AND A FORMULA TO FIGHT THEM Wells Fargo’s chief information security officer Rich Baich has to be very strategic about the way he spends his budget in order to protect the bank from the endless stream of cyberattacks launched at it every day. At the 2017 Borderless... February 23, 2019 Findbug News 3-RD WORKSHOP OF “THE DAY WHEN HACKING IS LEGAL” The International Conference on Cyber Security and Privacy will bring tremendous innovation from the field of online security and privacy. On February 2 there is a rare and unique opportunity for Kosovo and the Region. “The Day When Hacking is... February 22, 2019 ‹› Subscribe FindBUG for better Cyber Security *Your Full Name *Your Email *Phone Number *Company/Organisation *Your Job Position Before submit I have read and accept Terms&Conditions! OUR GLOBAL PARTNERS USA: 9040, South Rita Road, Tech Parks Arizona, Tucson Arizona, USA 85747 Kosovo: Str. Zeki Shulemaja 1st Floor, 10000 Prishtina, Republic of Kosovo About Service Hackers How it Works Blog Terms & Conditions WhitePapers Privacy Policy Business Profile © 2019, FindBUG.io supported by MIN GET IN TOUCH ————————————————- Subscribe FindBUG for better Cyber Security *Your Full Name *Your Email *Phone Number *Company/Organisation *Your Job Position Before submit I have read and accept Terms&Conditions! ×