>
About us
Encouraging the responsible
Encouraging the responsible
reporting of zero-day
vulnerabilities
Our mission is to create a secure bridge platform where researchers can
anonymously submit their findings while clients get unprecedented
technologies for offensive and defensive operations in cyberspace.
- Tailored methods for every researcher
- Compensation in line with global norms for the industry
- Easy and transparent zero-day acquisition procedure
- Possession of all necessary permissions
- Safety granted! No chance of exploits getting mishandled
>
Targets and categories
Desktops
Mobiles
Servers
Vrirtualization
Software
Software
Routers
Baseband
>
Acquisition process
1
Contact
After reviewing the description and, if necessary, asking the researcher additional clarifying questions, we issue a preliminary offer.
2
Evaluation
We examine the exploit within a business week.
3
Code exchange
The researcher provides us with the exploit's source codes.
4
Verification
We examine the exploit within a business week.
5
Payment
When validated, we send the researcher their compensation.