Alternatives to Dework

Compare Dework alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Dework in 2026. Compare features, ratings, user reviews, pricing, and more from Dework competitors and alternatives in order to make an informed decision for your business.

  • 1
    Hacken

    Hacken

    Hacken

    Hacken is a trusted blockchain security auditor on a mission to make Web3 a safer place. With a team of 60+ certified engineers, Hacken provides solutions covering all aspects of blockchain security, such as Smart Contract Audit, Blockchain Protocol Audit, dApp Audit, Penetration Testing, CCSS Audit, Proof of Reserves, DORA Compliance, Tokenomics Audit and design. From security audits and bug bounties to DORA Compliance, AML Monitoring, and Threat-Led Penetration Testing, Hacken delivers solutions that bridge innovation and compliance. Through collaborations with institutions like the European Commission and ADGM, Hacken sets security standards. Since 2017, Hacken has been raising the bar for blockchain security. They have already worked with 1,500+ Web3 projects to enhance their security standards. Hacken clients and partners include top-industry players, such as BNB chain, NEAR, Avalanche, Polygon, Cronos, Klaytn, and Venom, to name a few.
  • 2
    TOKPIE

    TOKPIE

    TOKPIE

    First Cryptocurrency Exchange Platform with BOUNTY STAKES TRADING service. Earn, trade, and invest as never before. TOKPIE is the only one cryptocurrency exchange in the world that provides Bounty Stakes Trading solution allowing its users to earn, trade and invest as never before. Bounty Stakes Trading is the revolution in bounty common practice and a win-win-win solution for bounty hunters, smart investors, and crypto startups (ICO, STO, post token sale projects). It simultaneously allows bounty hunters get both ‘cash’ immediately after performing any kind of bounty tasks and related project's tokens later, investors get the highest ROI (Return on Investments) by obtaining promising tokens with a huge discount, startups boost their bounty campaigns and token/coin sales by allowing participants to trade earned stakes on the Tokpie platform. Get 'cash' (Ethereum, USDC, etc) by selling part of bounty stakes immediately as soon as they earned.
  • 3
    Uptoken

    Uptoken

    Upstock

    ​Uptoken helps enable crypto companies at any stage to easily incentivize their employees & ecosystems without fearing scammers or regulators. RTUs act as deferred compensation so that you can promise tokens to practically anyone, anywhere while reducing fraud & regulatory risk. Since RTUs act as deferred compensation, Uptoken helps enable projects to delay the issuance of their token until certain milestones are met, such as liquidity, utility, or safe harbor. Uptoken helps enable crypto companies to promise tokens to contributors in 70+ countries, including America. Uptoken makes the job of community managers easier by enabling them to create bounties, track & verify submissions, & dynamically reward contributions.
  • 4
    XDAO

    XDAO

    XDAO

    XDAO – expanding multichain DAO ecosystem built for a decentralized future. The main idea of XDAO is to allow people to create a decentralized autonomous organization of any size. XDAO is working on delivering a product that reveals the full potential of a company on a blockchain by providing it with all the tools they need for successful operations. For more savvy users XDAO can also be described as an off‐chain voting mechanism with on‐chain execution. The XDAO is a winner of the BSC Hackathon, HECO Hackathon and also granted by Polygon over the summer of 2021. What can be done with XDAO: ‐ DeFi project treasury team management. ‐ Salary treasury/marketing treasury for any blockchain organization. ‐ Grant program/bug bounty treasury. ‐ Investing in DeFi with mutual assets. ‐ Investing in NFT and GameFi. ‐ Charity. ‐ Joint participation in any Allocations, IDOs or Launchpads. ‐ Family treasury management and many other use cases.
    Starting Price: free
  • 5
    huntr

    huntr

    huntr

    Get paid to find & fix security vulnerabilities in open source software and be recognised for protecting the world. We believe that it's important to support all of open source and not just enterprise-backed projects. That's why our bug bounty program rewards disclosures against GitHub projects of all sizes. Rewards include bounties, swag and CVEs.
  • 6
    Immunefi

    Immunefi

    Immunefi

    Since its founding, Immunefi has become the leading bug bounty platform for web3 with the world's largest bounties and payouts and now has over 50+ employees around the world. If you're interested in joining the team, please see our careers page. Bug bounty programs are open invitations to security researchers to discover and responsibly disclose vulnerabilities in projects’ smart contracts and applications, which can safe web3 projects hundreds of millions--and even billions--of dollars. For their good work, security researchers receive a reward based on the severity of the vulnerability. When you find a vulnerability, create an account and submit the bug via the Immunefi bugs platform. We have the fastest response time in the industry.
  • 7
    Bugbop

    Bugbop

    Bugbop

    Bugbop is a bug bounty and disclosure platform built for program managers. Bug bounty and disclosure programs create a safe channel for security researchers to report vulnerabilities. Teams review the findings, remediate valid issues, and optionally offer financial rewards/swag. By using a platform, you get increased visibility and authenticity, structured workflows, automated triage, researcher management, and payment handling - admin chores that are difficult and time-consuming to handle yourself. Bugbop has simple pricing ($0 monthly + 15% on bounties) and can be set up completely self-service (i.e. no "call us for a demo and pricing"). It removes program noise with automated AI triage and severity analysis. It gives teams a flexible way to run bug bounty or disclosure without the overheads of the enterprise platforms. You can sign up for free to test the platform with a private program.
  • 8
    Open Bug Bounty

    Open Bug Bounty

    Open Bug Bounty

    Open Bug Bounty project enables website owners to receive advice and support from security researchers around the globe in a transparent, fair and coordinated manner to make web applications better and safer for everyone’s benefit. Open Bug Bounty’s coordinated vulnerability disclosure platform allows any security researcher reporting a vulnerability on any website as long as the vulnerability is discovered without any intrusive testing techniques and is submitted following responsible disclosure guidelines. The role of Open Bug Bounty is limited to independent verification of the submitted vulnerabilities and proper notification of website owners by all available means. Once notified, the website owner and the researcher are in direct contact to remediate the vulnerability and coordinate its disclosure. At this and at any later stages, we never act as an intermediary between website owners and security researchers.
  • 9
    Bountysource

    Bountysource

    Bountysource

    Bountysource is the funding platform for open-source software. Users can improve the open-source projects they love by creating/collecting bounties and pledging to fundraisers. Anyone can come to Bountysource and create or claim their project's team (GitHub Organizations are automatically created as teams on Bountysource). A bounty is a cash reward offered for development. In the case of Bountysource, this ties directly to an open issue in the system. Bountysource itself is concerned. Any quality control for whether to accept a fix is the responsibility of the maintainers for the given project. This includes whether affiliation with the project counts for having the fix accepted or not.
  • 10
    OAK Network

    OAK Network

    OAK Network

    OAK is the native token of OAK Network, which is a delegated proof of stake network with the purpose of providing decentralized and trustless cross-chain automation. OAK aims to provide users with easy and affordable tools to schedule and automate payments that can be triggered by time, token price, or other events. Providing these services to millions of users OAK requires a thriving ecosystem that is both secure and incentivizes good faith participation in the network for all stakeholders. This paper describes the economic structure OAK uses to reward good faith participation from a wide variety of stakeholders including automation users, stakers, collators, and investors. You may be entitled to OAK distribution from participating in OAK Network crowdloan, ambassador program, bug bounty and other events.
  • 11
    DIA

    DIA

    DIA Association

    DIA (Decentralised Information Asset) is an open-source oracle platform that enables market actors to source, supply and share trustable data. DeFi applications are reliant on trustable and scalable data feeds to build reliable products and avoid exploitation and manipulation. DIA leverages crypto-economic incentives and the wisdom of the community to source, validate and deliver trusted financial data. Bounties for data sourcing and data validation get funded with DIA tokens and are completed for reward. All data is pulled from primary sources to DIA servers. The DIA database gets hashed on-chain, and all scraper code and documentation is hosted on Github. All data is accesible via API endpoints or Oracles. Lending platforms, index providers, prediction markets and other users can freely acces DIA’s open-source, validated data streams.
  • 12
    Gnosis Chain

    Gnosis Chain

    Gnosis Chain

    Gnosis Chain is one of the first Ethereum sidechains and has stayed true to its values. By allowing contributors around the globe to easily run a node, Gnosis Chain is secured by over 120k validators. Its diverse validator set and the community governance ensure Gnosis Chain remains credibly neutral at a much lower price point than mainnet. Gnosis Chain is EVM-based and secured by at-home stakers around the world. Gnosis has all the tooling you are used to and trustless bridges to mainnet soon.
  • 13
    BountiXP

    BountiXP

    BountiXP

    bountiXP is a holistic, employee-centric platform that unifies and aligns people for success. One platform, multiple recognition and engagement apps. Our multi-application platform provides a dynamic, 360-degree, employee-centric experience of recognition and engagement. Combining the power of goal-based and values-based recognition, bountiXP aligns strategy and culture for improved people performance. Enables everyone in the organization to send and receive messages of thanks, praise, appreciation and support. Empowers everyone to nominate a colleague or team to receive a reward for the value they add to the organization. Allows managers to recognize and reward employees, reinforcing the link between strategy, culture and success. Elevate messages that reinforce organizational goals with the addition of points. As a hub of social recognition and engagement, bountiXP enables people to establish connections and build relationships around shared values and common purpose.
    Starting Price: $7.76 per user per month
  • 14
    Magna

    Magna

    Magna

    Stay compliant, track your transactions, and automate your tax withholdings to create the perfect token operations system. Distribute tokens to investors and employees securely on autopilot with Magna’s audited smart contracts. Manage your legal agreements (SAFTs, token warrants, token grants) and communicate the value of your future token. Time based vesting, back weighted vesting, milestone based vesting, and more. Our software can easily support your most complex case. An intuitive claim portal in your project’s branding where your stakeholders can support your project and claim their unlocked tokens. Full control over every on-chain action with custom action permissioning, through integrations with Gnosis Safe, Squads, and other wallet providers. Calculate withholding taxes on token grants. Report and audit every distribution to streamline your compliance workflows.
  • 15
    Yogosha

    Yogosha

    Yogosha

    Run, manage and oversee all your Offensive Security testing —Pentest as a Service and Bug Bounty— on one secure platform for a seamless, interoperable and efficient DevSecOps experience. - PTaaS: a timely and cost-efficient security audit of your assets. Your security weaknesses identified for a flat fee. Launch a test within a week. - Bug bounty: a continuous, adversarial and pay-per-result testing to detect business-critical vulnerabilities. We rely on a secure platform, available as SaaS or self-hosted, and on a private and selective community of security researchers, the Yogosha Strike Force. Each member of the YSF has been screened through stringent technical and pedagogical tests, after which only 20% of candidates are accepted.
  • 16
    CyStack Platform

    CyStack Platform

    CyStack Security

    WS provides the ability to scan web apps from outside the firewall, giving you an attacker's perspective; helps detect OWASP Top 10 and known vulnerabilities and constantly monitoring your IPs for other security threats. The team of CyStack pen-testers conducts hypothetical attacks on a customer's applications to discover security weaknesses that could expose applications to cyberattack. As a result, the technical team can fix those vulnerabilities before hackers find and exploit them. Crowdsourced Pen-test is the combination of certified experts and community of researchers. CyStack deploys, operates, and manages the Bug Bounty program on behalf of enterprises to attract a community of experts to find vulnerabilities in technology products such as Web, Mobile, Desktop applications, APIs or IoT devices. This service is a perfect solution for companies that are interested in the Bug Bounty model.
  • 17
    DigiFinex

    DigiFinex

    DigiFinex

    The Easiest Way to Start Your Crypto Lifestyle. Ranked top 10 globally by volume and liquidity. Our in-house developed security system with multiple fail-safe layers, giving your cryptocurrencies bank-graded protection. Invest in your favorite cryptocurrencies using credit card, and enjoy the best rate on the market. 24/7 Professional customer support. Knowledge to empower everyone, noobs and experts alike. Varieties of interactive bounties and generous rewards for you to grab. The transaction fee for the Spot transaction is 0.2% per times, DFT holder can enjoy the discount. Become a VIP user and enjoy a lower transaction fee, with a minimum fee of 0.060%. DFT is the native exchange token of DigiFinex. DFT, with its multiple use cases, powers the entire DigiFinex Ecosystem. DigiFinex is the world's top 10 crypto exchange by trading volume and liquidity, offering spot, leverage, perpetual swap trading, and fiat to crypto trading.
    Starting Price: 0.2% per times
  • 18
    HackenProof

    HackenProof

    HackenProof

    We are a web3 bug bounty platform since 2017. We help to set a clear scope (or you can do it by yourself), agree on a budget for valid bugs (platform subscription is free), and make recommendations based on your company`s needs. We launch your program and reach out to our committed crowd of hackers, attracting top talent to your bounty program by with consistent and coordinated attention. Our community of hackers starts searching for vulnerabilities. Vulnerabilities are submitted and managed via our Coordination platform. Reports are reviewed and triaged by the HackenProof team (or by yourself), and then passed on to your security team for fixing. Depending on preference, you can choose to publicly disclose any reports, once the issues are resolved. We connect business with a community of hackers from different parts of the globe.
    Starting Price: $0 per month
  • 19
    PolySwarm

    PolySwarm

    PolySwarm

    Unlike in any other multiscanner, in PolySwarm there is money at stake: threat detection engines back their opinions with money, at the artifact level (file, URL, etc.), and are economically rewarded and penalized based on the accuracy of their determinations. The following process is automated and is executed by software (engines) in near real time. Users submit artifacts to PolySwarm’s network via API or web UI. Crowdsourced intelligence (engine determinations) and a final score (PolyScore) are sent back to the User. The money from the bounty and the assertions becomes the reward, which is securely escrowed in an Ethereum smart contract. Engines that made the right assertion are rewarded with the money from the initial bounty from the enterprise plus the money the losing engines included with their assertions.
    Starting Price: $299 per month
  • 20
    SuperBots
    New product of the UpBots eco-system, SuperBots was launched 2 weeks ago, and is the result of a work made possible by the investment of Alameda Research. SuperBots is a decentralized protocol for automatic trading based on algorithms. After many audits of our innovative protocol, including Certik and SolidProof, as well as a bug bounty on Immunefi which validated the security of our smart contract, the DApp is finally available, and works with the UBXT token, listed on FTX, Kucoin and many DEX. We have already added several features, like the SuperVault and will continue to add other unique features, like decentralized trading in leverage, futures, etc... We have just started, with a product on BSC, and will soon launch on ETH and Polygon. Our user base is growing and we hope to continue its growth with your help.
  • 21
    BC Vault

    BC Vault

    BC Vault

    BC Vault is a new generation of crypto hardware wallet that stores your private keys on a safe hardware device, whose design is tailored to the needs of both seasoned and nascent crypto investors. It embodies a reasonable blend of functionality, reliability, independence and security. BC Vault is birthed by comprehensive research, tests and the thirst to offer you a nonpareil experience. BC Vault is unlike any other crypto hardware wallet on the market right now, as it is a truly secure, easy-to-use cryptocurrency vault, which has multiple unique features, currently unavailable on other devices. It supports the most coins and tokens from all the crypto HW wallets on the market. Every shipped BC Vault device has a 1BTC bounty crypto wallet preloaded in it. In essence, every wallet has a private key for a wallet containing 1 BTC. If you can break it, you can be 1 BTC richer.
    Starting Price: $130 one-time payment
  • 22
    HydraDX

    HydraDX

    HydraDX

    Provide liquidity only for the asset you want. The Omnipool will mint and burn a corresponding amount of the pool token LRNA. Deep, diversified and unfragmented liquidity enables 2-4x more capital-efficient trading thanks to lower slippage and fewer hops. Built for B2B. Any project/DAO Treasury can provide liquidity using XCM and gain instant exposure to an ocean of assets. Trustless, without hidden costs and while accumulating (diversified) POL from trading fees. Liquidity Providers are supported by several non-inflationary mechanisms for mitigating impermanent loss. Provide liquidity for selected assets and receive additional rewards on top of trading fees. Paid out HDX or any other supported asset. The HydraDX Omnipool is fully audited and supported by a generous bug bounty program. Cutting-edge mechanisms such as liquidity caps, protocol fees and circuit-breakers work together to protect your liquidity.
  • 23
    SnowCone

    SnowCone

    SnowCone

    A suite of tools for DAO creation funding, and organizational management. SnowCone provides much more than contract deployment. Gain access to SnowCone’s scalability framework, analytics tools & DAO marketplace. Choose a template that fits your organization's needs. Customize your DAO's token distributions, funding limits, voting models, & much more. Hire or get hired by other DAOs while having access to Avax-based DeFi protocols. Everything you need to build hype and retention. Whether it's 1000 or 50, we will make it simple. The SnowCone Apostles program is designed to reward members interested in building out the future of DAOs. Join the scouts and complete weekly tasks on our discord to rank up and start earning. Stay updated on airdrops, NFT releases, and all things SnowCone. A suite of tools for DAO creation funding, and organizational management. Make your web3 login experience feel right at home on your website. SnowConeKit allows you to fully customize everything.
  • 24
    Sherlock

    Sherlock

    Sherlock

    Sherlock is a blockchain security platform that delivers rigorous smart contract audits using a hybrid model combining dedicated expert review and crowdsourced audit contests to reveal vulnerabilities that traditional approaches often miss. It pairs the close scrutiny of top security auditors with incentive-driven participation from the global security community, ensuring many eyes examine the code under contest-based bounties. After an audit is complete, Sherlock optionally provides smart contract coverage, meaning it may pay out up to $500,000 USDC if flaws slip through, which aligns Sherlock’s incentives with those of its customers. The platform also supports continuous bug bounty programs, requiring a small deposit per submission to discourage noise, while expert triaging ensures only meaningful vulnerabilities reach clients. Their claims process is governed by an impartial third party to ensure fairness and transparency.
  • 25
    BountyJobs

    BountyJobs

    BountyJobs

    Technology can’t replace humans in recruiting, but it can make their collaboration more effective. At BountyJobs we use technology to connect the right humans at the right time. Nearly a quarter of jobs go to third-party search in the US. Businesses of all sizes seek third-party help for their most important hires. And for the most part, this work happens in an unmeasured, offline process that is challenging for both the businesses that seek help and the recruiters who assist. BountyJobs brings the third-party recruiting ecosystem into the light. Our platform connects employers and third-party recruiters — making the collaboration for critical hiring clear, streamlined and efficient. From start-ups to Fortune 100 enterprises, we support companies seeking talent for their hardest-to-fill roles with our marketplace of top recruiters. Let’s get you started! Sourcing talent for critical jobs requires great third-party recruiters.
  • 26
    Com Olho

    Com Olho

    Com Olho

    Com Olho is a SaaS based, AI-assisted Bug Bounty Platform to uncover vulnerabilities through a community of cyber security researchers each of which follow a stringent KYC process, allowing organizations to strengthen their online systems and applications, ensuring security compliance through built-in collaboration tools, support, documentation and advanced reporting.
  • 27
    Squads

    Squads

    Squads

    DeFi protocols and NFT communities can register their token with Squads to allow their holders to participate in governance via proposals and on-chain voting. Core proposal functionality goes to mainnet first to allow NFT communities to initiate proposals and set up on-chain voting. All the DAO primitives (deployment, voting and treasury) in one simple interface are coming to devnet. Expanded Vault functionality with treasury management components. Just spin up a Squad in a few clicks to run your internal governance or just use Squads as a multisig. Create a Squad to hold in-game assets jointly and manage your guild via on-chain proposals.
  • 28
    Utopia

    Utopia

    Utopia Labs

    Meet the modern system for managing payment requests, payroll, and reporting for your DAO. Manage your invoices and expenses from your contributors with one link. Execute recurring salaries to your core contributors on autopilot. Automatically organize your transactions through tags for transparent reporting. Come build the infrastructure to scale DAOs to people all around the world. Put your DAO's invoices on autopilot. DAOs allow individuals across the world to collaborate, allocate capital, and make decisions towards a common goal. It gives access for anyone to capture direct value from what they create, and helps align incentives across millions, if not billions, of people. DAOs (Decentralized Autonomous Organizations) open up a future world in which anyone from anywhere can work together on global companies, projects, or initiatives. It opens up access and aligns incentives for billions of people.
  • 29
    YesWeHack

    YesWeHack

    YesWeHack

    YesWeHack is a leading Bug Bounty and Vulnerability Management Platform. Founded by ethical hackers in 2015, YesWeHack connects organisations worldwide to tens of thousands of ethical hackers, who uncover vulnerabilities in websites, mobile apps, connected devices and digital infrastructure. The YesWeHack platform offers a range of integrated, API-based solutions: Bug Bounty (crowdsourcing vulnerability discovery); Vulnerability Disclosure Policy (creating and managing a secure channel for external vulnerability reporting); Pentest Management (managing pentest reports from all sources); Attack Surface Management (continuously mapping online exposure and detecting attack vectors); and ‘Dojo’ and YesWeHackEDU (ethical hacking training). YesWeHack's services have ISO 27001 and ISO 27017 certifications, and its IT infrastructure is hosted by EU-based IaaS providers, compliant with the most stringent standards: ISO 27001 (+ 27017, 27018 & 27701), CSA STAR, SOC I/II Type 2 and PCI DSS.
  • 30
    SafeHats

    SafeHats

    InstaSafe

    The SafeHats bug bounty program is an extension of your security setup. Designed for enterprises, the program taps into a vast pool of highly skilled and carefully vetted security researchers and ethical hackers to comprehensively test your application’s security. It also provides your customers with comprehensive protection. Run programs that suit your current security maturity level. We have designed a Walk-Run-Fly program concept for Basic enterprises, progressive and advanced enterprises respectively. Testing for more sophisticated vulnerability scenarios. Researchers are incentivized to focus high severity and critical vulnerabilities. A comprehensive policy between the security researchers and clients bound by mutual trust, respect, and transparency. Security researchers from diverse profiles, backgrounds, ages, and professions, creating a wide range of security vulnerability profiles.
  • 31
    Analog

    Analog

    Analog

    The Timechain operates as a permissionless network with a dynamic group of validators, also known as time nodes, that implement the nominated Proof-of-Stake (NPoS) consensus algorithm and, later, Proof-of-Time (PoT) protocol. Participation in securing the network is open to anyone who has attained a ranking score and staked some $ANLOG tokens. Analog Network derives its security from threshold cryptography, novel consensus protocol, and validator observers (sentinels) — with validator security rules, rigorous audits, and bug bounties. You can customize your dApp’s security settings, such as the number of chronicle workers participating in threshold cryptography, as needed. Analog Network provides a unified API — called the Watch API — that brings visibility to data from any connected blockchain through an intuitive and easy-to-use interface. Use the Watch SDK and streamlined API to quickly build and scale your cross-chain apps.
  • 32
    EthicalCheck

    EthicalCheck

    EthicalCheck

    Submit API test requests via the UI form or invoke EthicalCheck API using cURL/Postman. Request input requires a public-facing OpenAPI Spec URL, an API authentication token valid for at least 10 mins, an active license key, and an email. EthicalCheck engine automatically creates and runs custom security tests for your APIs covering OWASP API Top 10 list Automatically removes false positives from the results, creates a custom developer-friendly report, and emails it to you. According to Gartner, APIs are the most-frequent attack vector. Hackers/bots have exploited API vulnerabilities resulting in major breaches across thousands of organizations. Only see real vulnerabilities; false positives are automatically separated. Generate enterprise-grade penetration test reports. Confidently share it with developers, customers, partners, and compliance teams. Using EthicalCheck is similar to running a private bug-bounty program.
    Starting Price: $99 one-time payment
  • 33
    ARK

    ARK

    ARK Ecosystem

    Whether you're a blockchain enthusiast, a solo developer, or a 100+ strong Enterprise, ARK has the blockchain solutions you've been searching for. The ARK Public Network (APN) is the official home of the native ARK crypto asset. The APN is integrated with the ARK Blockchain Platform as well as Projects, products, and swap services to give Blockchain developers the best tools to succeed. ARK is fully open source allowing anyone to contribute. Earn bounties for your contributions and join a thriving community of developers just like you. The ARK Blockchain Framework architecture is fully modular, allowing you to customize your chain to fit your application's needs. ARK Logic allows you to create your own custom Smart Transactions that allow your application to implement native Smart Contract functionality in a simple way.
  • 34
    Sifchain

    Sifchain

    Sifchain

    Sifchain is the brainchild of Sif, the Norse goddess of earth, agriculture, fertility, family, and marriage. She brings abundance, pleasure, and wisdom wherever she goes. She has blessed a hearty band of 21st century humans with the task of instantiating Sifchain in our universe. Sif represents the collaborative nature of the blockchain industry and the lush rewards that can be found in cultivating connections between multiple other chains. The vision of her moving gracefully through her fields, harvesting a bountiful array of crops, the culmination of all of her hard work and forethought, is what we strive to reproduce in our work on Sifchain. We hope you’ll join us in these noble pursuits. Sifchain is the omni-chain solution for DEXes. More performant, more robust cryptoeconomics for trading and security, more flexible trading capabilities, an extensible omni-chain roadmap and eventual true DAO governance. Sifchain is the future of DeFi.
  • 35
    Meeds

    Meeds

    Meeds

    Build engaged communities thanks to decentralized Hubs. ▸ Automatically value micro-contributions ▸ Keep contributors informed of new incentives ▸ Personalize your contributors' experience ▸ Create contribution programs ▸ Set up and value desired contributions ▸ Streamline project coordination ▸ Automatically reward contributions with tokens ▸ Quickly recognize talent with kudos and badges ▸ Redeem your rewards for perks or donate them to causes
  • 36
    Floor

    Floor

    Floor

    The Floor app launched as a token-gated experience in November 2021. In the months since, Floor has released three generations of access tokens, created millions of opportunities for users, and built a product people love. Each token gets you access to the app and a premium gated Discord with the Floor team.
    Starting Price: Free
  • 37
    beSECURE

    beSECURE

    Beyond Security (Fortra)

    A flexible, accurate, low maintenance Vulnerability Assessment and Management solution that delivers solid security improvements. Designed to get you the most accurate and fastest possible improvement in network security customized for your organization’s needs. Continually scan for network and application vulnerabilities. Daily updates and specialized testing methodologies to catch 99.99% of detectable vulnerabilities. Data driven, flexible reporting options to empower remediation teams. *Bug bounty program* for any discovered proven false positives! Complete organizational control.
  • 38
    BugBounter

    BugBounter

    BugBounter

    BugBounter is a managed cybersecurity services platform that fulfills the needs and requirements of companies with thousands of freelance cybersecurity experts and service providers who are eligible members of the platform. Providing continuous testing opportunities, discovering unknown vulnerabilities on a success-based pay model ensures a cost-effective and sustainable service. Our democratized and decentralized operating model provides every online business an easy to access and affordable bug bounty program: from NGOs to startups, SBEs to large enterprises - we successfully serve.
  • 39
    Layer3

    Layer3

    Layer3 XYZ

    The best contributors use Layer3 to participate in leading web3 communities. Access secret work opportunities in crypto across these categories. Create your profile, start working in web3, and earn tokens, XP, and NFTs. We curate exclusive earning opportunities for our users with these communities & more. We'll drop the best new ways to earn in your inbox every week.
  • 40
    Trickest

    Trickest

    Trickest

    Join us in our mission to democratize offensive security with tailored best-in-class solutions that address the unique needs of professionals and organizations. Evolve from the terminal to a specialized IDE for offensive security. Use Trickest’s library of tool nodes, import your own scripts, or drop in your favorite open-source tools all in one place. Choose from template workflows for common tasks and a growing list of 300+ open source tools the security community loves. Run your workflows in the cloud with easy autoscaling and cost controls. Skip manual infrastructure setup and stop paying for idle VPSs. No more digging through filesystems for your old runs, use Trickest’s spaces, projects, and workflow versioning to stay on top of even the most complex projects. Trickest is for anyone who interacts with offensive security: enterprise security teams, red teams, purple teams, specialized pen testers, bug bounty hunters, security researchers, educators, etc.
  • 41
    Colony

    Colony

    Colony

    Colony makes it easy for people all over the world to build organizations together, online. Start an organization, give it structure, incentivize contributors, award reputation, and manage funds. No coding required. Smart, social decision making mechanisms help your organization get stuff done, avoiding voting where possible. Colony is open source and modular, enabling you to plug-in extensions to run your organisation your way. Domains can directly manage funds allocated to them, with flexibility to temper autonomy with oversight. Define, incentivize, and coordinate delivery of the product that provides your colony's value. Doing great work earns you reputation for the skills you used and domains to which you contributed. The Colony Network is a suite of smart contracts, running on Ethereum. It provides a general purpose framework for the essential functions organizations require, such as ownership, structure, authority, and financial management.
  • 42
    Braintrust

    Braintrust

    Braintrust

    Braintrust is the first decentralized Web3 talent network that connects skilled, vetted knowledge workers with the world’s leading companies. The community that relies on Braintrust to find work are the same people who own and build it, ensuring the network always serves the needs of its users, instead of a centrally-controlled corporation. And because the community of knowledge workers and contributors earns ownership and control of Braintrust through its native BTRST token for their contributions to the network and its growth, new Talent and jobs have participated in the network at record speeds. Braintrust has over 700,000+ community members, with knowledge workers and project contributors across the world. Braintrust is trusted by hundreds of Fortune 1000 global enterprises including Nestlé, Porsche, Atlassian, Goldman Sachs, and Nike.
  • 43
    Bounti

    Bounti

    Bounti

    Bounti enables faster, better, and more authentic prospecting in minutes. Our autonomous AI teammate saves you 40% of time spent on outreach and empowers your team to deliver meaningful and personalized engagement. Scale quickly and efficiently with an autonomous AI teammate. Our solution empowers your team to start prospecting immediately, in minutes, not weeks or months, with AI-generated research, use cases, pitches, and sample messaging to supercharge outreach without the delay of onboarding. Improve the quality and impact of your outreach with curated news, research, and messaging that is immediately relevant to the seller profile and the ICPs you need to engage. Better research means better connections. Instantly boost research, preparation, and prospecting. Improve the quality and impact of your outreach with curated news, research, and messaging that is immediately relevant to the seller profile and the ICPs you need to engage. Better research means better connections.
  • 44
    Degis

    Degis

    Degis

    Degis offers crypto asset protection products for users to hedge their risk and protect their vulnerability against token price volatility and smart contract hacks. Enjoy the yield boosting and governance power utility of Degis NFT. We are here to cover every risk and protect your assets secured. No matter whether you are buying or selling covers, we reward every contributor with $DEG token. We incentivize and empower every contributor with $DEG. Degis is the 1st all-in-one protection protocol built on Avalanche. The ultimate goal is to build a universal crypto-protection platform and shape a decentralized protection ecosystem. Protecting crypto assets is always the mission of Degis, and with blockchain technology, we are going to make protection reachable to every part of the world. Degis protocol launches on Avalanche C-chain, as well as DEG tokens. Currently, Degis protocol focuses on Avalanche native ecosystem. We may consider cross-chain according to the DeFi environment.
  • 45
    Yosemitex

    Yosemitex

    Yosemitex

    Using a volatile native crypto-currency causes a great hindrance in running a business. YOSEMITE resolves that problem by using tokens that have their values pegged to government-approved fiat money YOSEMITE's unique Proof-of-Transaction consensus algorithm, which allows only the direct contributors to the blockchain to create blocks and get rewarded, can address the fundamental problems in PoW, PoS consensus algorithms and sustain a fair and reasonable operation. Finally, governments and companies globally have a capable underlying system to utilize the advantages of blockchain and conduct sustainable policies and businesses. The YOSEMITE blockchain provides a unique YOSEMITE Standard Token model. Every account created can mint a YOSEMITE Standard Token and inherently run standard token operations natively supported at the blockchain core level. Interoperability among the tokens on the YOSEMITE blockchain is enforced and guaranteed by the blockchain core system.
  • 46
    DaoLens

    DaoLens

    DaoLens

    DaoLens is a suite of solutions with the aim of simplifying DAOs and digital communities. The future of Web3 will be anchored around the growth and participation of Digital communities and people coming together from across the world for shared goals. In its current format, this process becomes complicated due to a lack of context-building and shared knowledge. DaoLens onboarding tool aims to solve this by providing a FREE plug-and-play solution that can be deployed for new members joining a community. Community leaders can now make decisions on the journey of a user based on their roles, skillsets, and interest. They can also have curation done through gating features like NFT gating, interview gating, or task-based gating. More importantly, the growth of any community will be hugely influenced by the community leader's understanding of the behaviors and pain points of their community members. Our analytics gives insights about the community to the admins and community managers.
    Starting Price: Free
  • 47
    AlphaWallet

    AlphaWallet

    AlphaWallet

    AlphaWallet is the only self-custodial Ethereum network web3 wallet that’s completely open source for iOS and Android, with native ERC20, ERC721 and ERC875 support. AlphaWallet supports all Ethereum-based networks including Ethereum, Polygon, Gnosis, Binance, Avalanche, Optimism, Goerli, Mumbai. Its core features include it being beginner friendly with a simple user interface and 3-step onboarding process, an integrated web3 dApp browser, smart token categorization, WalletConnect available, ENS name management, biometric and pin-code security setup, wallet-watching, Blockscan wallet-to-wallet chat, the ability to send and receive via MagicLink and more.
  • 48
    Synack

    Synack

    Synack

    Comprehensive penetration testing with actionable results. Continuous security scaled by the world’s most skilled ethical hackers and AI technology. We are Synack, the most trusted Crowdsourced Security Platform. What can you expect when you entrust your pentesting to the Synack Crowdsourced Security platform? Become one of the select few SRT members and hack among the best in the world, sharpening your skills and putting them to the test. Hydra is an intelligent AI scanning tool that alerts our SRT members of possible vulnerabilities, changes, or events. In addition to bounties for finding vulnerabilities, Missions provide payment for methodology-based security checks. Trust is earned, and our currency is straightforward. A commitment to protect our customers and their customers. Utter confidentiality. Optional anonymity. Total control over the process. Complete confidence when you need to focus on your business.
  • 49
    Bitcoin SV

    Bitcoin SV

    Bitcoin SV

    Our ecosystem is based on four pillars that form the basis of Bitcoin SV’s infrastructure to create the one blockchain for the world. Enabling businesses to plan years in advance and commit significant resources to build on a stable protocol. Delivering capacity increases through scalable architecture and miner configurable block sizes. Fostering best practice change management processes, external security audits and lucrative bug bounty program. Unlocking the bricks-and-mortar merchant market and enabling new business models with micropayments and nanoservices. If you're a person completely new to digital currencies, a merchant that is looking to accept BSV payments, or an enterprise looking for blockchain solutions, BitcoinSV.com can help you source information about Bitcoin SV providing plenty of resources and useful links.
  • 50
    Cantina Code
    Cantina Code is a dedicated code-review platform optimized for security assessments, enabling clients and researchers to perform thorough reviews, communicate seamlessly, and manage submissions in one unified environment. The platform features a live, real-time findings dashboard that allows clients to track vulnerabilities and commentary as they occur, as well as filtering capabilities to sort by severity, author, or custom labels. For researchers, Cantina Code offers structured submission forms, built-in severity and status labels, and direct in-tool commenting and pinging so teams can collaborate easily and reduce noise. Reputation scores help triage work by highlighting trusted researchers and reducing spam, while an AI assistant aids in triage and de-duplication of low-signal submissions. The platform supports different engagement models, such as public competitions, private reviews, bug bounties, or collaborative assessments, with dashboard settings adapting to the review type.