Zero Days Submission

Submit Your vulnerability

This form was last updated March 18, 2021.

ZERO SECURITY

All questions should have the most detailed answers from this depends on what price we will offer you for your 0day exploit.

1. Rules of Representation

We constantly buy 0 day and N day vulnerabilities and exploits. We do not pay for hypothetical vulnerabilities. Please provide a brief technical description of the vulnerabilities and exploits on our form to our e-mail: sales@0-sec.net

Your vulnerability will be analyzed and evaluated by us within 48 hours. Remuneration can be paid in cash, bank transfers or anonymous transfers using crypto conversions.

We are considering an additional premium for exclusive conditions for us in the form of additional quarterly payments to researchers before disclosure of the vulnerability.

Prices 0 days can be higher than indicated in the table all depends on the quality of the exploits, we are ready to negotiate the price on a bilateral basis.

2. Services Provided

We also provide the ESCROW service when both parties can not agree and do not trust each other. Agents and brokers are welcome, we pay high commissions for help in acquiring 0 day vulnerabilities. We reserve the right to refuse to purchase your materials.

If you have any counter proposals regarding the acquisition process, you can always contact us. We can organize a personal meeting with you in practical any country in the world to personally discuss all the issues personally.

Vulnerability Opportunities

Depending on the technical information submitted, a price will be presented to you (the researcher) which you can then accept or counter. Once submitted we will respond with an offer which may be accepted or rejected.

    In addition to vulnerabilities, we are interested in obtaining various research results, such as:

    • Deanonimization of TOR network resources
    • Bypassing ASLR, DEP, UAC and other security mechanisms
    • Attack vectors for remote code execution on devices via GSM, Bluetooth and WiFi
    • Vulnerabilities on mobile chipsets
    • Innovative detour of antiviruses
    • Other research results and technical information

SPEC SHEET

All questions should have the most detailed answers from this depends on what price we will offer you for your 0day exploit.

Locate Our Spec Sheet Here: Download File

When submitting Spec-Sheet & PoC video please encrypt with our PGP Key: Download File

Email us: Sales@0-Sec.Net

Copyright 2021 @ Zero Security Research Labs LLC. Designed Altitude MM