Open Bug Bounty vs. YesWeHack

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Open Bug Bounty
Score 10.0 out of 10
N/A
Open Bug Bounty is an open, disintermediated, cost-free, and community-driven Bug Bounty platform for coordinated, responsible, and ISO 29147 compatible vulnerability disclosure. 862,692 coordinated disclosures, 488,651 fixed vulnerabilities,1285 bug bounties with 2,450 websites, 21,880 researchers, 1283 honor badges. Open Bug Bounty is used by Ebay, Berkeley University, Yamaha, IKEA, Verizon, Philips.N/A
YesWeHack
Score 0.0 out of 10
N/A
YesWeHack is an Offensive Security and Exposure Management platform. It provides a suite of integrated, API-based solutions designed to secure organisations’ growing attack surfaces. The YesWeHack platform comprises: - Bug Bounty: Crowdsourced vulnerability discovery leveraging a global community of 135,000+ skilled ethical hackers through a platform-driven model. - Autonomous Pentest: Comprehensive asset discovery combined with ongoing exposure validation to…N/A
Pricing
Open Bug BountyYesWeHack
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Open Bug BountyYesWeHack
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoYes
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
User Testimonials
Open Bug BountyYesWeHack
ScreenShots

Open Bug Bounty Screenshots

Screenshot of Open Bug Bounty home pageScreenshot of Awards for the researchersScreenshot of Start your own bug bounty program

YesWeHack Screenshots

Screenshot of a few public programs. These give the entire hunter community access to an organization's program to benefit from their diverse skills. YesWeHack Hunters can access all public programs of the platform.Screenshot of the Report Lifecycle dashboard, used to track key operational metrics and benchmark data against industries, other programs, country averages, or even the overall platform average - to improve an organization's security posture.Screenshot of the Business Unit Manager dashboard, used to track the performance of programs with a of display real-time metrics.Screenshot of a Bug Timeline dashboad, used to analyze the timeline to understand trends in reported bugs over time, grouped by severity level.Screenshot of a leaderboard. Here, organizations can earn ranking points by submitting vulnerability reports, based on the severity of the issue and the applicable reward grid.