Skip to content

hardenedlinux/0day-industry-awesome

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

0day-industry-awesome

The digital arms industry operates within the realms of both undisclosed (0-day) and publicly known (N-day) vulnerabilities, along with their corresponding exploit techniques. These digital arms are intangible weapons, structured in ways that can be challenging for people to grasp. Even experienced security professionals, ike security engineers, analysts, and CISOs, often find themselves entangled in misconceptions. What defines a bug? How does an exploitable bug differ? What exactly is a vulnerability, and what constitutes an exploit? What is an exploitation framework, and how do various exploit techniques fit into the picture? What distinguishes a weaponized exploit from a weaponized framework, package, or bundle? How are these concepts interconnected? During the period when HardenedLinux had a full-time maintainer (2015-2020), we dedicated ourselves to combatting digital arms through open source methodologies and along with engineered some fields of system security during HardenedVault. The asymmetry of information between attackers and defenders is striking. We've journeyed across multiple continents, and wherever we go, identifying oneself as part of the digital arms sector attracts eager business partnerships. In contrast, when discussing system security defenses, essentially positioning yourself as a shield builder, you may encounter dismissive reactions that convey sentiments like, “F* off, don’t waste my time!”

We frequently receive feedback reflecting confusion around radical threat models. Many individuals, driven by diverse motivations, dismiss the notion of confronting "The Desert of the Real" as futile or deny the desert's existence directly. However, we must ultimately face this reality. For defenders, comprehending weaponized exploits and the dynamics of the 0-day industry is essential for constructing effective cyber bunker. From the 0ldsk00l hacker mantra of "Hacking for fun and profit" to the inevitable reality of "This is cyber, sir!" in the age of cyber warfare, understanding these elements is crucial for navigating today’s complex landscape. This document will list the prices in the 0-day market because money is an easy language to both offensive and defensive sides. Any PR/contributions are welcomed!

0-day vendors

Vendor Base Last Updated Date Active status Product SLA Price
Intellexa North Macedonia/Israel/Hungary 2023? ??? Spyware package with Android/iOS 0-day exploits 12-month €8,000,000
Operation Zero Russia 2025 Active 0-day N/A varies
NSO Israel/US Oct 2025 Active Spyware package with Android/iOS 0-day exploits ??? unknown mininal package up to 55 million
Quadream Israel 2025 Active Spyware package with 0-day exploits ??? varies
Advanced Security Solution UAE 2025 Active 0-day N/A varies
Cellebrite Israel 2025 Active Forensics with 0-day exploits ??? $10k-$300k
Memento Labs (formerly Hacking Team) Italy 2025 Active Spyware package with 0-day exploits ??? varies
Paragon Solutions Israel 2025 Active Spyware package with 0-day exploits ??? varies
RCS Labs Italy 2025 Active Spyware package with 0-day exploits ??? varies
Vilicius Holding (formerly FinFisher) Germany 2025 Active Spyware package with 0-day exploits ??? varies
Saito Tech (formerly Candiru) Israel 2025 Active Spyware package with 0-day exploits ??? varies

Operation Zero

1

Advanced Security Solution

2

Bug bounty

Description Maximum Reward
Pixel Titan M with Persistence, Zero click Up to $1,000,000
Pixel Titan M without Persistence, Zero click Up to $500,000
Local App to Pixel Titan M without Persistence Up to $300,000
Secure Element Up to $250,000
Trusted Execution Environment Up to $250,000
Kernel Up to $250,000
Privileged Process Up to $100,000

3

Pwn2Own

In the mobile phone category of Pwn2Own Ireland 2025, the Pixel 9 and Apple iPhone 16 are priced the same, while the Samsung S25 is priced at only one-third of their cost. It's likely suggests that an all-in isolation-based EL2/hypervisor solution alone may be inadequate for defending against modern threats.

The era of Code, Trade, F***

As a security researcher, after dedicating months or even years to developing a state-of-the-art zero-day exploit, you'll face a crucial decision: should you sell it to a bug bounty program or a zero-day broker?

Option Pros Cons
Bug Bounty Program - Legitimacy: Builds reputation as a responsible researcher.
- Higher Value: Companies may pay well for high-impact finds.
- Support: Often provides resources and support during the reporting process.
- Ethical Impact: Contributes to overall security improvements.
- Limited Payment: Rewards may not match the full potential market value.
- Disclosure Process: May require public disclosure timelines, potentially limiting future sales.
- Competition: Higher competition among researchers could decrease your individual payout.
Zero-Day Broker - Higher Prices: Brokers often pay more than bug bounty programs.
- Anonymity: Allows selling without associating your name with the exploit.
- Flexible Terms: Brokers may accept terms that allow multiple sales.
- Legality and Ethics: Selling to brokers may be seen as unethical or illegal.
- Trust Issues: The broker's reputation varies; some may not honor payments.
- Market Saturation: Exploits may lose value if bought in bulk by brokers for resale.

Reference

About

0day-industry-awesome

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published