Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.



The Most Trusted Hacker-Powered Security Platform

Work for HackerOne?

Learning about HackerOne?

We can help you find the solution that fits you best.

Find the Right Product

HackerOne Reviews

Ask HackerOne a Question
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • Industry
Company Size
User Role
Showing 3 HackerOne reviews
LinkedIn Connections
HackerOne review by Shane W.
Shane W.
Validated Reviewer
Review Source

"HackerOne is a pretty good cybersecurity tool"

What do you like best?

HackerOne is pretty good they usually test every vulnerability of the software or application you use. The entire process is lengthy but the it is worth the wait. You can see any exploits in the system they give you a whole background process information on all the bugs hidden in the firmware. The software will test the security of the system to help find bugs, this is a great way to minimize threats against your software or platforms. Hackerone gives you a whole report on the analysis they have done. I think the company is skillful and pretty good at what they do and I would trust them.

What do you dislike?

I believe that Hackerone could provide more features so that we can have a better option at viewing and analyzing the cracks and bugs in a software system. You will also have to contact them at times for all the analysis reports they have provided. The reports will not be very simplistic to understand.

Recommendations to others considering the product

If you think there is a lot of data being managed by your systems and there might be a issue of a leak then hackerone is a good way to go they will help you out finding all the threats.

What business problems are you solving with the product? What benefits have you realized?

We have analysed the security of our web interface using the help from hackerone and we built a more strong and secure platform so that any threats will not be able to penetrate the security of our system.

Sign in to G2 to see what your connections have to say about HackerOne
HackerOne review by Carlos Daniel C.
Carlos Daniel C.
Validated Reviewer
Review Source

"Joy with HackerOne"

What do you like best?

Easy to use

Multiple ways to categorize an issue so that it can be reported efficiently.

Gives an easy way to track issue and open issues again if they aren't resolved properly.

What do you dislike?

I wish HackerOne's integrations were self-service and more fully-featured.

I'd love a way to set this up myself, and for that integration to go both ways,

Recommendations to others considering the product

It is one of the good platforms for security researchers to submit bugs and other vulnerabilities, it however, has some challenges, in terms of un-verified and duplicate submissions.

What business problems are you solving with the product? What benefits have you realized?

HackerOne informed my team of a number of security vulnerabilities in our application which we were able to fix quickly and discreetly.

What Penetration Testing solution do you use?

Thanks for letting us know!
HackerOne review by Administrator in Computer Software
Administrator in Computer Software
Validated Reviewer
Review Source
Business partner of the vendor or vendor's competitor, not included in G2 scores.

"Great Application"

What do you like best?

HackerOne develops bug bounty solutions to help organizations reduce the risk of a security incident and that's what I like. The company itself is successful because we have an amazing product, great clients, and a wonderful team. Multiple ways to categorize an issue so that it can be reported efficiently.

What do you dislike?

A lot of duplicate bugs get reported, although it does offer automatic suggestion of previously reported bugs that may be duplicates, it is far from perfect.

Anyone can report bugs, a lot of them are not verified before submission. This sometimes leads to a lot of time spent in verifying if the bug is really actionable.

Each submission has to be treated with equal potential, a lot of time, some time gets invested in vulnerabilities that aren't as important as some others.

What business problems are you solving with the product? What benefits have you realized?

Bug Bounty Programs

There are not enough reviews of HackerOne for G2 to provide buying insight. Below are some alternatives with more reviews:

Metasploit Logo
Metasploit Pro is a penetration testing tool that increases penetration tester's productivity, prioritizes and demonstrates risk through closed-loop vulnerability validation, and measures security awareness through simulated phishing emails.
SQLmap Logo
Automatic SQL injection and database takeover tool
Veracode Application Security Platform Logo
Veracode Application Security Platform
Veracode is the world's best automated, on-demand application security testing and code review solution.
BeEF Logo
BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.
Swascan Security Suite Logo
Swascan Security Suite
Provides automated security testing and security scan of web applications to identify vulnerabilities, scans your network and devices and suggest to you recommendations on how they can be fixed, and provides a source code analysis to identify and resolve security weaknesses and vulnerabilities
6 Logo
Cobalt's Pen Testing as a Service (PTaaS) Platform transforms yesterday’s broken pen test model into a data-driven vulnerability management engine. Fueled by our global talent pool of certified freelancers, Cobalt's crowdsourced SaaS pen test platform delivers actionable results that empower agile teams to pinpoint, track, and remediate software vulnerabilities. Hundreds of organizations now benefit from high quality pen test findings, faster remediation times, and higher ROI for their pen test budget.
Detectify Logo
Detectify is a SaaS based website security service that analyzes and monitors the security level of a user's website by applying a broad range of emulated hacker attacks and provide report that describes the identified vulnerabilities and their potential risk in the hands of malicious hackers.
Defensics Logo
Test running apps and services for common security weaknesses and vulnerabilities using malformed inputs to detect flaws. Leverage fully automated tests across 250+ test suites, protocol-specific attack patterns and automatic test mutation
SATAN is a tool to help systems administrators. It recognizes several common networking-related security problems, and reports the problems without actually exploiting them.
CAST Application Intelligence Platform Logo
CAST Application Intelligence Platform
CAST Application Intelligence Platform (AIP) is an enterprise-grade software measurement and quality analysis solution designed to analyze multi-tiered, multi-technology applications for technical vulnerabilities and adherence to architectural and coding standards and then provide business relevant information to the IT organization through various dashboards and products built with end users in mind.
Show more
Kate from G2

Learning about HackerOne?

I can help.
* We monitor all HackerOne reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.