Banner object (1)

Hack and Take the Cash !

805 bounties in database
  Back Link to program      
Absolute Technologies Lab - 100K Crypto Challenge logo
Hall of Fame


Absolute Technologies Lab - 100K Crypto Challenge

Absolute Technologies invites you to test our first metaprogramming based quantum encryption technology. We appreciate your efforts and hard work in making our technology more secure, and look forward to working with the researcher community to create a meaningful and successful challenge. Good luck and happy hunting!


This program has a unique reward structure and is not a normal bug bounty. The goal here is to decrypt the following files:

You must be able to decrypt at least one file, and explain how it was done to be offered the challenge reward

Testing is only authorized on the targets listed as In-Scope. Any domain/property of Absolute Technologies not listed in the targets section is out of scope. This includes any/all subdomains not listed above.

Target Info

  • It is not a block cipher
  • Here are the hash codes of encrypted files (not in order):

Power function:111a35e870b9e293d935c0fa6fbcfc287b5490cdd9b6734aa8d23c09df0e3fca

Power function:d4fd9dfc6c77b722e7a7174102167961e9fdb8f2a7d4d3d05efbfb1ebfa09584

Power function:fa394c27d2888eded0f953809bbbcde475e6d8639a9bff126f7acfc27764ccda

Power function:d92eda14fc32ee6db618e59da096febeba1819e404a1b7098409a3028a5f8321

Power function:e000b87cf6b8db5bbf9dc47ce426820f3fae9f5faacc7b050f59dd24cab945b4


  • Any web property and apps of Absolute Technologies
  • No Denial of Service attacks on our web properties

Safe Harbor:

When conducting vulnerability research according to this policy, we consider this research to be:

  • Authorized in accordance with the Computer Fraud and Abuse Act (CFAA) (and/or similar state laws), and we will not initiate or support legal action against you for accidental, good faith violations of this policy;
  • Exempt from the Digital Millennium Copyright Act (DMCA), and we will not bring a claim against you for circumvention of technology controls;
  • Exempt from restrictions in our Terms & Conditions that would interfere with conducting security research, and we waive those restrictions on a limited basis for work done under this policy; and
  • Lawful, helpful to the overall security of the Internet, and conducted in good faith.
  • You are expected, as always, to comply with all applicable laws.

If at any time you have concerns or are uncertain whether your security research is consistent with this policy, please inquire via before going any further.

Program rules

This program follows Bugcrowd’s standard disclosure terms.

This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.

This program have been found on Bugcrowd on 2019-11-07.

FireBounty © 2015-2020

Legal notices