Initial Submission
Researcher shares minimal zero-day details, affected target information, and an asking price through the contact channel.
> Exploit Acquisition Program for Researchers
> Offensive Security Solutions for Governments & Enterprises
> A streamlined workflow for researchers: minimal initial disclosure, structured review, secure validation, and payment against agreed terms.
Researcher shares minimal zero-day details, affected target information, and an asking price through the contact channel.
If the submission matches our target scope, MintelX responds with price guidance, commercial terms, and next-step expectations.
Researcher submits the full exploit, reproduction material, and technical documentation using the agreed secure workflow.
MintelX validates exploit behavior, documentation quality, and reliability against the agreed review criteria.
Once validation is completed, the researcher is paid according to the previously agreed commercial terms.
> FAST_PRESCREEN
Researchers do not need to disclose every technical detail at first contact. A concise summary and price expectation are enough for an initial scope decision.
> End-to-end strategic services
We maintain an ethical acquisition program for independent researchers and teams, with clear scope and confidential handling. We prioritize high-impact zero-day vulnerabilities that meet rigorous validation criteria.
We deliver discreet, decision-grade cyber capabilities to carefully selected and trusted customers.
Strategic guidance on zero-day acquisition, region-focused cyber intelligence and technical advisory on exploit engineering (chaining, payload reliability and weaponization)
MintelX is a specialized security research & exploit brokerage firm founded by well-known senior vulnerability researchers and offensive security practitioners.
MintelX operates at the intersection of zero-day acquisition, exploit engineering, and cyber intelligence. Our work focuses on transforming technical access into strategic, decision-grade intelligence for governments and institutional stakeholders. We support the global security research community through researcher bounty programs, fair acquisition models, and by sponsoring security conferences and collaborative research initiatives worldwide.
Trusted researcher network with technical validation
Working with trusted buyers aligned with our ethical values.
Strict compliance with applicable international trade regulations and export control frameworks.
Istanbul, Turkiye