dotsFirst-Rate Bounties

We reward some of the world’s most gifted security researchers with first-rate remuneration, so you can continue your important and increasingly challenging work.

Who We Are

dotsResearchers Protected

To safeguard the exchange process, Incredity only works directly with government intelligence clients on high-end engagements and stipulates a strict three-sales limit per exchange.

Who We Are

dotsComplementary Legal Support

We’ve raised the bar in the support security researchers can expect throughout the submission process.

Everyone we work with can look forward to receiving legal analysis and advice as a complementary service.

Who We Are

dotsIncredity Target Portfolio

Incredity is interested in the highest standard of intelligence strategic capabilities, including fully-weaponized exploits and incomplete weaponized vulnerabilities. Our Target Portfolio includes sophisticated unique fuzzing infrastructures as well as research projects and more

android

Windows

Component

Windows Remote Code Execution

Windows Privilege Escalation

Zero-Interaction

Additional Payment

  • i-link
  • Chain Components
  • i-link
  • Persistence
android

Linux

Component

Linux Remote Code Execution

Linux Privilege Escalation

Zero-Interaction

Additional Payment

  • i-link
  • Chain Components
  • i-link
  • Persistence
android

iOS

Component

iOS Remote Code Execution

iOS Privilege Escalation

Zero-Interaction

Additional Payment

  • i-link
  • Chain Components
  • i-link
  • Persistence
android

Android

Component

Android Remote Code Execution

Android Privilege Escalation

Zero-Interaction

Additional Payment

  • i-link
  • Chain Components
  • i-link
  • Persistence
android

Tactical

Component

Wifi Remote Code Execution

Baseband Remote Code Execution

Bluetooth Remote Code Execution

Additional Payment

  • i-link
  • Chain Components
  • i-link
  • Persistence
android

Browsers

Component

Chrome Remote Code Execution

Safari Remote Code Execution

Firefox Remote Code Execution

Additional Payment

  • i-link
  • Chain Components
android

Virtualization

Component

VMware VM Escape

Virtual Box VM Escape

KVM VM Escape

XEN VM Escape

Hyper-V VM Escape

Additional Payment

  • i-link
  • Chain Components
android

Client Side

Component

MS Office Remote Code Execution

Adobe Remote Code Execution

Outlook/Thunderbird Remote Code Execution

Additional Payment

  • i-link
  • Chain Components
android

Web Servers

Component

Apache HTTP Server Remote Code Execution

Microsoft IIS Remote Code Execution

Nginx Remote Code Execution

Additional Payment

  • i-link
  • Chain Components
android

Instant Messaging

Component

Whatsapp Remote Code Execution

Signal Remote Code Execution

Telegram Remote Code Execution

WeChat Remote Code Execution

Line Remote Code Execution

Additional Payment

  • i-link
  • Chain Components

dotsSolutions in 6 Secure Steps

Solutions in 6 Secure Steps
  • 01

    Submission

  • 02

    Due-diligence

  • 03

    Analysis

  • 04

    Support

  • 05

    Offer

  • 06

    Reward

  • 1. SubmissionYou submit minimal details in an encrypted message to Incredity.

  • 5. OfferFollowing our secure compliance procedure, Incredity makes an offer.

  • 4. SupportComplementary legal analysis and advice becomes available to you.

  • 3. AnalysisIncredity analyses the vulnerability or exploit and confirms its interest.

  • 2. Due-diligenceIncredity starts the due-diligence process, following a non-disclosure agreement (NDA).

  • 6. RewardYou receive payment.