Cyber Stress Testing
- Select programFor hackersHelp improve the security of major companies for generous rewards.
- Learn moreFor businessSee how well your organization is protected.
A legitimate way to test security, where you earn rewards not for single bugs, but for achieving a bigger goal—a non-tolerable event inside the company's infrastructure
Select programExample tasks

Gaining database access

Compromising user or administrator accounts

Gaining access to bank accounts or financial transactions

Obtaining full control over critical services
Participate in cyber stress testing programs—solo or with a team—and earn up to ₽45M for a successful attackSelect program
Explore current programs
View allHow to participate in a cyber stress test
- 01Choose a cyber stress testing
program. - 02Decide how you'll participate:
solo or as a team. - 03Review the program terms
and conditions. - 04Perform an attack and submit
your report.
- 01Choose a cyber stress testing
program. - 02Decide how you'll participate:
solo or as a team. - 03Review the program terms
and conditions. - 04Perform an attack and submit
your report.
Important!Before participating, carefully review the program terms. Cyber stress testing programs differ from bug bounty programs in that they have defined goals and deadlines. Typically, rewards are paid only for achieving a specific goal, which means that only the first hacker to cause the non-tolerable event will receive the reward.
Cyber Stress Testing stars
@remembernamer₽5.6M
@brain₽4M
@b4bay₽4M
@FedyaSyel₽2.5M
@Bagley₽2M
The tougher the challenge, the greater the reward
Earn up to 45M rubles for demonstrating a non-tolerable event.
View tasksup to ₽45M
Cyber stress testing options
Cyber stress testing with Positive Technologies
Cyber stress testing with JSC Kiberispytanie
FAQ
- A cyber stress test is a legal form of security testing where rewards are granted for achieving a specific objective—a non-tolerable event within the company's infrastructure. Examples of non-tolerable events include gaining access to a database or taking control of critical services.