.png?width=60&height=27&name=Dots%20Yellow%20(2).png)
Intigriti’s Live Hacking Events
Harness the power of our ethical hackers in a unique setting with maximum impact.

Launch a Live Hacking Event with Intigriti and take your bug bounty program to the next level.
- High-profile events that attract top hacking talent
- Vibrant atmosphere where companies and hackers can have fun
- Intensive hacking in a short period of time
.png?width=30&height=14&name=Dots%20Yellow%20(2).png)
Why every company should run a Live Hacking Event?
What makes live hacking events so special? Key Intigriti team members and researchers come together in this video to discuss the benefits of this experience. As well as giving insight to why the collaborative nature of the hacking is so unique, it also gives a taste of the fun that occurs at these events.
.png?width=30&height=14&name=Dots%20Yellow%20(2).png)
What is a Live Hacking Event?
Live Hacking Events are a unique way to promote your security bug bounty program and fix vulnerabilities in your company’s assets. Key benefits of a Live Hacking Event include:

Expert skills
Tap into the most talented researchers from our community of 70,000 ethical hackers

PR opportunities
These exciting events allow you to demonstrate your progressive approach to security

Tailor your event
Physical or virtual Live Hacking Events are available to suit your requirements
.png?width=30&height=14&name=Dots%20Yellow%20(2).png)
Our previous Live Hacking Events
Every live hacking event is unique, and we work closely with you to determine the exact specifications that will help you best achieve your objectives. If, however, you’re looking for inspiration, some of our previous event formats can provide examples of approaches you might want to take.
Yahoo’s 1337UP0822
Choosing 40 security researchers and in-scope targets including their open-source text engine tool Vespa, this event kicked off virtually prior to the physical event, before the hackers came together for two days to hack under one roof.
With 218 vulnerability submissions and a total bounty payout of $240,000, the event was a resounding success and provided a deep introspection of Yahoo’s assets. Read more about the event →
Visma’s 1337UP1121
Visma’s first Live Hacking Event ran virtually for two weeks, finding 251 vulnerabilities. These included two reports of exceptional-severity bugs, two critical flaws, and two zero-day vulnerabilities.
The success of 1337UP1121 led Visma to continue with live hacking events, opting for a physical event the second time round where they opted to test their accounting program, e-conomic. Read more about the event →
.png?width=30&height=14&name=Dots%20Yellow%20(2).png)
How do Live Hacking Events work?
Live Hacking Events are always tailored to your needs. We work with you to define and plan the event to ensure you achieve your objectives. There are four key questions we will answer together:

Location
Where it will be held and whether it will be a physical or virtual event. This can be a location of your choosing and can also be a combination of physical and virtual. While physical events benefit from the social buzz and face-to-face interactions, virtual events can produce an equally impressive hacking performance.

Duration
The duration of the event. While hugely flexible, most tend to go for 24-48 hours. One option can be to run a virtual version of the event over a longer period of time, even several weeks, while still carrying out the physical event over a few days.

Scope
Defining the scope of the project and who exactly will be in attendance. Live Hacking Events are particularly effective at testing more mature security assets. The hackers themselves are hand-selected, and we will help connect you with the right skill sets in our community that are required for your project.

Marketing opportunities
How we will promote, run, and triage the event. This includes all marketing operations you would like to engage in, with the option to hold a quieter affair always available. While our renowned triage team will be available to you, there is also the option to use a team of your choosing.


With a live hacking event, you have some of the most talented hackers all in one place, making it one of the fastest methods of clearing up serious security issues.
Cristian Zot, cristi
Security Researcher at Intigriti
Request a demo!
.png?width=30&height=14&name=Dots%20Yellow%20(2).png)
Live Hacking Events FAQ
Yes! These are separate products, and while there are many advantages to running both, there is no necessity. Live Hacking Events tend to be most appropriate when testing mature assets within a short timeframe, but they can be performed regardless of whether you have adopted any other crowdsourced solutions.
The hackers themselves are hand-selected, and we will help connect you with the right skill sets in our community that are required for your project.
This can be done everywhere! Paris, Madrid, New York, Tokyo - it’s all possible!

.png?width=30&height=14&name=Dots%20Yellow%20(2).png)
Useful links
Learn more about Live Hacking Events and discover the full range of Intigriti’s solutions:
Our annual survey of our hacking community, giving a key overview into the who, what and why of bug bounties.