hacker.txt

Define security testing boundaries for ethical hackers and automated tools. A standardized way to communicate what's allowed and what's not.

Advertisement
Ulties

Ulties is a software development house, with speciality in security and performance. Reach out for a free quote.

Your Company

Want to advertise here? Become a partner and reach thousands of security professionals and developers.

Standardized Format

A clear, structured way to define security testing boundaries using simple directives.

Easy Integration

Place the file in your website's root directory for immediate effect on security testing.

Generator Tool

Create your hacker.txt file easily with our interactive generator tool.

# Example hacker.txt file
Allow-Pentesting: yes
Testing-Scope: example.com, *.example.com
Testing-Window: 00:00-06:00 UTC
Testing-Types: SQLi, XSS, CSRF, SSRF, IDOR, -DDoS
Security-Contact: security@example.com
Bug-Bounty: https://bugbounty.example.com