Who is behind Hacky

Last updated on 27.06.2024

Manuel Lusti and Philipp Brügger work together on Hacky. Their joint web agency, Codia, supports the two founders in the further development of Hacky. Codia and Hacky are self-financed by the two founders and all shares are owned by them, without investor:in, loan or credit. Hacky is currently a project by Manuel Lusti and Philipp Brügger, which is supported by Codia. Hacky, like Codia, is independent and has no external influencers.

Also interesting

Do I need a test environment?

No. The conditions for the hackers should be as real as possible. Normally your productive system/network is tested directly. This allows you to find gaps that may be closed on the test server but still exist in production or in components that only exist there.
Aktualisiert: 27.04.2024

What are the hackers allowed to do?

On our platform, you – and of course our hackers – will find a precise list of what is permitted and what is prohibited. You can include or exclude further points. We are also happy to assist you if you have any questions. However, if you are unsure, we recommend that you simply use the Hacky template, as it includes and excludes everything relevant and will certainly be ideal for you to start with.
Aktualisiert: 27.04.2024

What do all these terms mean?

We always try to communicate as clearly and simply as possible. It may happen that we use a term that you are not familiar with. We would therefore like to discuss how we define and interpret certain terms.
Hacker, Expert, White Hat, Ethical Hacker
A person who has excellent knowledge of computer security and specializes in finding vulnerabilities in networks, software and systems. We always act ethically and never exploit these vulnerabilities, but report them immediately to the individuals and companies concerned.
Bug Bounty
If a reward is paid to the finder for reporting a vulnerability or bug.
Bug, Vulnerability, Vulnerability, Gap
When a system or software does not behave as expected. This behavior of the software could then potentially alienate purpose.
(Hacker) Community
All hackers who search for possible vulnerabilities in the listed infrastructures on our platform and report them to us.
bounty, reward
If a hacker reports a valid vulnerability, they will receive a reward for it.
Scope
Defines the area or the systems that may be tested for bugs/vulnerabilities and the methods with which these tests are permitted.  
Aktualisiert: 27.04.2024