0-day vulnerabilities research and exploits development

Part of our work is 0-day vulnerability research and exploit development. We do not report the vulnerabilities back to the software/hardware vendors as we believe these vulnerabilities can be used in a good way (catching pedophiles, drug dealers, etc.). We offer our customers consulting on the use cases they may have and depending on the customer and project we decide whether we will share one of the discovered 0-day vulnerabilities via an exploit package.

Examples of 0-day exploits available:

  • Microsoft defender bypass
  • Trend Micro Apex One bypass
  • Google Chrome remote code execution
  • Microsoft Edge remote code execution
  • iOS remote code execution
  • Android remote code execution
  • Microsoft Windows privilege escalation