Security Researchers
Convert knowledge into profit and integrity into long-lasting business relationships.
We help security stakeholders to leverage cybersecurity capabilities.
Convert knowledge into profit and integrity into long-lasting business relationships.
Enable tailored operations and help to reach confidence in today’s interconnected operational environment.
Asses the security posture of an organization and mitigate the risks faced by its stakeholders.
Zeronomicon highly values and rewards the integrity and the findings of security researchers. At Zeronomicon, we acquire zero-day exploits targeting vulnerabilities affecting prevalent or otherwise relevant software. If your exploit is reliable and has never been reported before, we would love to hear from you.
Did you write a reliable exploit for one of the following products? Please get in touch and we may offer to acquire it. Does your exploit targets a product not listed below? Feel free to reach out to us; we are open to consider the opportunity.
Please be reminded that some exploits are explicitly not admitted to the Zeronomicon acquisition program. For more information make sure to check out our Code of Business Ethics and our FAQs. Also, Zeronomicon will not acquire vulnerabilities whose security risk has not been constructively proved with running code.
In all cases the reliability of the exploit remains an essential prerequisite for the acquisition.
At Zeronomicon we are actively pursuing new acquisitions. At the same time, we reserve the right (that is to say, not the obligation) to make an offer.
Are you ready to submit your findings? Do you have a question for us? Please get in touch using a PGP encrypted email and be sure to provide us with your PGP public-key. We will be happy to hear from you.