Report it
Buying zero-days targeting network hardware (routers, firewalls) to secure network reliability and data flow.
We’re actively purchasing zero-day vulnerabilities affecting Windows, macOS, and Linux systems, especially those that can impact security and system control.
Seeking zero-days in major web browsers like Chrome and Firefox. We're interested in exploits that compromise user privacy or system security.
Focused on acquiring vulnerabilities within Android and iOS that reveal security risks or data access.
Purchasing zero-days impacting AWS, Azure, or Google Cloud to enhance cloud infrastructure security.
Interested in zero-days in office and collaboration tools, especially vulnerabilities affecting data integrity and access.
Government Agencies
Private Security Firms
Technology Enterprises
Financial Institutions
Defense Contractors