About Pwn0rama

Pwn0rama is a premium exploit acquisition program by COSEINC with a focus on mobile platform exploit codes. We believe in paying the appropriate financial rewards to support the research of independent security researchers.

Program Payout

Desktop and Server Payouts

Category Payout for RCE Payout for LPE Payout for RCE + LPE
Windows 0-click - - Up to $300,000
Chrome Up to $50,000 - Up to $150,000
Firefox / TOR Up to $30,000 - Up to $100,000
Edge Up to $30,000 - Up to $80,000
Safari Up to $30,000 - Up to $80,000
Adobe Flash Up to $80,000 - Up to $100,000
Adobe PDF Up to $50,000 - Up to $80,000
MS Outlook Up to $100,000 - -
ThunderBird Up to $80,000 - -
MS Office Up to $50,000 - -
Windows OS - Up to $30,000 -
Linux OS - Up to $30,000 -
Mac OS - Up to $30,000 -
VMWare ESXI VM Escape - Up to $80,000 -
VMWare Workstation VM Escape - Up to $50,000 -

RCE: Remote Code Execution
LPE: Local Privilege Escalation



Mobile Payouts

Category Payout for RCE Payout for SBX Payout for LPE Payout for RCE + LPE
iOS 0-click Remote Jailbreak - - - Up to $1,500,000
iOS Remote Jailbreak - - - Up to $1,000,000
Email App - - - Up to $500,000
Chrome Up to $50,000 Up to $100,000 - Up to $150,000
Safari Up to $50,000 Up to $100,000 - Up to $150,000
iOS - - Up to $100,000 -
Android - - Up to $100,000 -

RCE: Remote Code Execution
LPE: Local Privilege Escalation
SBX: Sandbox Escape

Frequently Asked Questions


Who can take part in Pwn0rama?

We welcome all researchers, except those from United Nations sanction list, to take part in Pwn0rama.

What is the Submission Process of Pwn0rama?

If you have an exploit code within the categories that we are looking for:

1. Download our PGP key.
2. Send us an PGP encrypted email with the following information:

a. Name of targeted software/hardware/platform.
b. Version and architecture (x86, x64 etc) of targeted software/hardware/platform.
c. Type of vulnerability (eg. Infoleak, UAF etc).
d. Attack vector/scenario.
e. Success rate of exploit code execution (50%, 80%, 100% etc).
f. Time delay for exploit code execution (number of seconds).
g. Exploitation environment (default installation, privilege, user interaction etc).
h. Setting and/or configurations required for successful exploitation.
i. Any limitations or special requirements?
j. Your PGP key.

3. We will acknowledge your email and assess your initial submission.
4. If we are not interested in your initial submission, we will inform you so via email within 2 weeks.
5. If we are interested in your initial submission, we will reply you, within 2 weeks, with an initial offer.
6. If you accept our initial offer, you will send us, via PGP encrypted email, the following information for our complete evaluation:

a. A fully functional exploit source code.
b. A detailed technical write-up of the exploit code.
c. A detailed technical write-up of the vulnerability.

7. We will acknowledge your email and evaluate your submission.
8. We may correspond with you for clarifications or more information.
9. We will make you a Final Offer within 2 weeks.

What kind of submissions is Pwn0rama interested in?

Operating Systems Browsers Applications Devices
Android Google Chrome Microsoft Office Apple iPhone
Apple iOS Microsoft Edge Microsoft Outlook Samsung
Microsoft Windows Mozilla Firefox Mozilla Thunderbird LG
Apple macOS Apple Safari Adobe Reader Huawei
Linux TOR Adobe Flash Player Google
VM Xiaomi
360

Which types of vulnerabilities/exploits are eligible?

Pwn0rama is interested in critical vulnerabilities and fully functional and reliable exploitation codes that will lead to arbitrary code execution, privilege escalation, sandbox escape and leakage of sensitive information.

How much do we pay?

Payout details can be found above.

How do we pay you?

Payment will be via bank transfer (local or international).

What about Privacy and Confidentiality?

We respect researchers’ privacy. We will not disclose your identity or any of your personal information to Third Parties.

What do we do with your research?

Submissions acquired by Pwn0rama will be offered as part of COSEINC’s security research offerings to legitimate government organisations and corporations.

Contact

Feel free to contact us for more details.