We acquire high-impact vulnerabilities that pose significant security risks and are accompanied by a fully functional, reliable exploit (preferably with a PoC or weaponised chain).
Eligible submissions typically target:
-
Modern desktop and mobile operating systems
-
Widely deployed enterprise software
-
Embedded, IoT, and network devices
For detailed scope, platform coverage, and specific requirements, please refer to our Exploit Acquisition Program.