Introducing BountyMachine

Why we built BountyMachine

The easiest to automate findings can have a huge impact

Building everything from scratch is a bad idea

We need to do security at scale

Monitoring is important

Building a BountyMachine

How BountyMachine works

  1. You give BM a target. We have an API you can use to supply targets so you can use any input method you like as long as it can issue simple HTTP requests. Our current personal favorite is Slack Slash Commands.





Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Community validator booster — ECO Stake

Private Sale Remaining Tokens Supply BURNED

Islander x Avalaunch AMA session in Islander Community recap Listing Vote #50-Sylo(SYLO) Listing Vote #70 -Alchemy Pay (ACH) , $32,000 ACH Giveaway

The State of OSWE

{UPDATE} New York Mysteries 2 Hack Free Resources Generator

{UPDATE} Wild Animal Hunting Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


More from Medium

Managing Network Security Lifecycles in Multi Cluster OpenShift Environments with OpenShift…

Introducing Pods (and other Kubernetes objects)

LENS-Kubernetes IDE-part-2

PART 1 — Red Hat OpenStack Platform (OSP) Service Telemetry Framework (STF) with OpenShift…