100+
Regular
customers
10+
Years of Сybersecurity
experience in total
5+
Years is an average time
spent working with a client
TOP 5 EU
We have connections in
the intelligence agencies
of the Top 5 EU countries
Base
We have a well-established
customer base among government
agencies and large corporations
Compliance
Each client goes through a
series of compliance procedures

Our solutions are aimed at combating evil: terrorism, human trafficking, security threats, etc.

Government Organisations

We provide individual work and help to achieve confidence in a modern interconnected operating environment

commercials Corporations

We reduce the risks of cybersecurity threats, thereby warning against large losses

Security Researchers

Convert knowledge into profitability and integrity into enduring business connections

We always strive to find a convenient collaboration option

Because it's important to us that the client feels comfortable working with us
If you'd like to collaborate, please email us — hello@tnsecurity.com
We seek an individual approach to everyone who works with us
Our clients gain early access to all potential cyber security threats
We work with custom requests tailored to the needs of our clients
And we are ready to support research by purchasing or providing hardware or software if necessary

We are considering acquiring a wide range of vulnerabilities

If your exploit is not listed, please contact us, and we will assist you in any case
Learn Bounties for exploits
Network Devices
Mail Servers
MSP
NAS
Operating Systems
DataBases
Desktop Applications
Office Software
Web Servers
Messengers
Mobile
Web Applications
Hosting Panels
ERP
Also we acquire exploits for: Fitness trackers, Security Systems, Appliances, Robotic Cleaners,Smart Speakers and Displays,CCTVs,Cars and Motorcycles

We value comfort and confidentiality in collaborating with our researchers

Of researchers
work with us again
The amount paid to
researchers
Average processing
time for requests

We are interested in long-term, comfortable and completely legal collaboration with researchers

You can also find more detailed and additional information on the FAQ page
We have an individual approach to each researcher
We are ready to support research by providing hardware
If necessary, we can cover the cost of training and skill development

Up to 7 million dollars for a vulnerability — we are willing to pay

Learn Bounties for exploits
We pay for vulnerabilities
within 1 week
We offer various payment formats, all of which are confidential
We are ready
to make extra
payments

Our submission processing time is less than a week

Submit an Exploit
1

Preliminary Contract

Researchers sends minimal detail and specifications of the exploit
2

Preliminary
Offer

We review the minimal details and send a preliminary offer
3

Code
Submission

Researcher submits the full technical details and exploit to us
4

Code
Evaluation

We review the research and test the exploit then send the final offer
5

Final
Payment

Researcher accepts the final offer and receives the payment in one week

Our Big Idea is to keep the world secure and reward those who help us achieve it

Comfort

We provide individual work and help to achieve confidence in a modern interconnected operating environment

Speed

We are for quick resolutions to all tasks and problems

Reliability

We trust the people we work with

Stability

Long-term and high-quality relationships are what we work for
Copy PGP KEY
-----BEGIN PGP PUBLIC KEY BLOCK-----
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=vw7O
-----END PGP PUBLIC KEY BLOCK-----