Incredity for Security Researchers

Contribute to Incredity to better protect those who protect our national securities.

First-Rate Bounties

We reward some of the world’s most gifted security researchers with first-rate remuneration, so you can continue your important and increasingly challenging work.

Researchers Protected

To safeguard the exchange process, Incredity only works directly with government intelligence clients on high-end engagements and stipulates a strict three-sales limit per exchange.

Complementary Legal Support

We’ve raised the bar in the support security researchers can expect throughout the submission process. Everyone we work with can look forward to receiving legal analysis and advice as a complementary service.

6 steps

Solutions in 6 Secure Steps

Step 1

Submission

You submit minimal details in an encrypted message to Incredity.

Step 2

Due-diligence

Incredity starts the due-diligence process, following a non-disclosure agreement (NDA).

Step 3

Analysis

Incredity analyses the vulnerability or exploit and confirms its interest.

Step 4

Support

Complementary legal analysis and advice becomes available to you.

Step 5

Offer

Following our secure compliance procedure, Incredity makes an offer.

Step 6

Reward

You receive payment.

Incredity Target Portfolio

Incredity is interested in the highest standard of intelligence strategic capabilities, including fully-weaponized exploits and incomplete weaponized vulnerabilities. Our Target Portfolio includes sophisticated unique fuzzing infrastructures as well as research projects and more

Windows
Component

Windows Remote Code Execution

Windows Privilege Escalation

Zero-Interaction

Additional Payment


Chain Components

Persistence

Linux
Component

Linux Remote Code Execution

Linux Privilege Escalation

Zero-Interaction

Additional Payment


Chain Components

Persistence

iOS
Component

iOS Remote Code Execution

iOS Privilege Escalation

Zero-Interaction

Additional Payment


Chain Components

Persistence

Android
Component

Android Remote Code Execution

Android Privilege Escalation

Zero-Interaction

Additional Payment


Chain Components

Persistence

Tactical
Component

Wifi Remote Code Execution

Baseband Remote Code Execution

Bluetooth Remote Code Execution

Additional Payment


Chain Components

Persistence

Browsers
Component

Chrome Remote Code Execution

Safari Remote Code Execution

Firefox Remote Code Execution

Additional Payment


Chain Components

Virtualization
Component

VMware VM Escape

Virtual Box VM Escape

KVM VM Escape

XEN VM Escape

Hyper-V VM Escape

Additional Payment


Chain Components

Client Side
Component

MS Office Remote Code Execution

Adobe Remote Code Execution

Outlook/Thunderbird Remote Code Execution

Additional Payment


Chain Components

Web Servers
Component

Apache HTTP Server Remote Code Execution

Microsoft IIS Remote Code Execution

Nginx Remote Code Execution

Additional Payment


Chain Components

Instant Messaging
Component

Whatsapp Remote Code Execution

Signal Remote Code Execution

Telegram Remote Code Execution

WeChat Remote Code Execution

Line Remote Code Execution

Additional Payment


Chain Components

Start Your Journey to a Safer World