ZERODIUM is the world's leading exploit acquisition platform for premium zero-days and advanced cybersecurity capabilities. We pay BIG bounties to security researchers to acquire their original and previously unreported zero-day research. While the majority of existing bug bounty programs accept almost any kind of vulnerabilities and PoCs but pay very low rewards, at ZERODIUM we focus on high-risk vulnerabilities with fully functional exploits and we pay the highest rewards (up to $2,500,000 per submission).
ZERODIUM is currently acquiring zero-day exploits and innovative security research related to the following products:
Remote code execution or local privilege escalation, or VM escape:
- Microsoft Windows
- Linux / BSD
- Apple macOS
- VMware ESXi
Remote code execution, or sandbox bypass/escape, or both:
- Google Chrome
- Microsoft Edge
- Mozilla Firefox
- Apple Safari
Remote code execution or sensitive information disclosure:
- MS Office (Word/Excel)
- Adobe Acrobat / Reader
- Email (Outlook/Thunderbird)
- Archivers (7-Zip/WinRAR/WinZip/Tar)
Remote code execution, or privilege escalation, or any other exploit type:
- Apple iOS
- Apple watchOS
- Android
- Windows Mobile
Remote code execution or sensitive information disclosure:
- Apache HTTP Server
- Microsoft IIS Server
- nginx web server
- PHP / ASP
- OpenSSL / mod_ssl
Remote code execution or sensitive information disclosure:
- MS Exchange
- Dovecot
- Postfix
- Exim
- Sendmail
Remote code execution, or SQL injection, or information disclosure:
- cPanel / Plesk / Webmin
- WordPress / Joomla / Drupal
- vBulletin / MyBB / phpBB
- IPS Suite / IP.Board
- Roundcube / Horde
Any other security research, exploits, or techniques related to:
- WiFi / Baseband RCE
- Routers / IoT RCE
- AntiVirus RCE/LPE
- Tor De-anonymization
- Mitigations Bypass
Apple, Google, Samsung, LG, Huawei, OPPO, Sony, HTC, Xiaomi, and BlackBerry.
CentOS, Fedora, Red Hat Enterprise Linux, Ubuntu, Debian, Tails, NetBSD, OpenBSD, and FreeBSD.
MikroTik, Ubiquiti, ASUS, Cisco, D-Link, Huawei, Linksys, , Netgear, and TP-Link.
NOTE: If you have zero-day exploits for other products or systems not listed above, feel free to submit minimal details and we will be glad to discuss the opportunity.
ZERODIUM payouts for eligible zero-day exploits range from $2,500 to $2,500,000 per submission. The amounts paid by ZERODIUM to researchers to acquire their original zero-day exploits depend on the popularity and security level of the affected software/system, as well as the quality of the submitted exploit (full or partial chain, supported versions/systems/architectures, reliability, bypassed exploit mitigations, default vs. non-default components, process continuation, etc). For more information, please read our FAQ.
The payout ranges listed below are provided for information only and are intended for fully functional/reliable exploits meeting ZERODIUM's highest requirements. ZERODIUM may pay even higher rewards for exceptional exploits and research.
ZERODIUM reviews and validates all submissions within one week or less. Payments are made in one or multiple installments by bank transfer or cryptocurrencies (e.g. Bitcoin, Monero, Zcash). The first payment is sent within one week or less.
For inquiries and/or exploit submissions, please contact us.