We acquire high-impact vulnerabilities that pose significant security risks and are accompanied by a fully functional, reliable exploit (preferably with a PoC or weaponised chain).
Eligible submissions typically target:
- 
Modern desktop and mobile operating systems
 - 
Widely deployed enterprise software
 - 
Embedded, IoT, and network devices
 
For detailed scope, platform coverage, and specific requirements, please refer to our Exploit Acquisition Program.