Peraturan Submit
Kami tidak akan menerima posting Vulnerable atau exploit terhadap website nyata ( real website ).
Untuk mempercepat di terimanya pengajuan postingan anda silahkan mengikuti panduan berikut:
1) Kirim satu Exploit setiap satu email,dengan judul email seperti judul Exploit.
2) Kirim file Exploit anda menggunakan ekstensi file attachment seperti berikut (.zip, .tgz, .gz, .rar, .c, .py, .txt, .pl, html, etc..)
3) Cantumkan link software yang memiliki celah / kerentanan jika memungkinkan
Peraturan Artikel yang bisa di posting
1) Kami tidak akan menerima non-persistent kerentanan / vulnerable XSS
2) Kami tidak akan menerima kerentanan / vulnerable XSS untuk aplikasi kecil.
3) Kami tidak akan menerima laporan kerentanan / vulnerable tanpa memicu rincian.
4) Kami tidak akan menerima eksploitasi untuk perangkat lunak yang tidak dapat ditemukan di internet.
5) Kami tidak akan menerima duplikat eksploitasi yang hanya ditulis dalam bahasa yang berbeda.
Ketika menyerahkan Eksploit, Anda harus menyertakan setidaknya header seperti di bawah ini:
# Judul Eksploit: [judul]
# Google Dork: [jika relevan]
# Tanggal: [data]
# Author: [author]
# Software Link: [link download jika tersedia]
# Version: [app version]
# Kategori: [remote, local, webapps, dos, etc..]
# Tested on: [relevant os]
Kirimkan artikel ke email : root@exploit-id.com


Submissions rules
We will NOT accept, process or post any vulnerabilities which are targeted against live websites.
To speed up your submission entry please follow these guidelines:
1) Send 1 exploit per mail, with the mail subject as the exploit title.Exploit Database Submit Exploit
2) Send your exploit as a file attachment, (.zip, .tgz, .gz, .rar, .c, .py, .txt, .pl, html, etc..)
3) Include a link to the vulnerable software if possible.
Submission Entry Rules:
1) We will not accept non-persistent XSS vulnerabilities
2) We will not accept XSS vulnerabilities for minor applications.
3) We will not accept vulnerability reports without triggering details.
4) We will not accept exploits for software which can’t be found on the net.
5) We will not accept duplicate exploits that are simply written in a different language.
When submitting an exploit, you should include at least these headers:
# Exploit Title: [title]
# Google Dork: [if relevant]
# Date: [date]
# Author: [author]
# Software Link: [download link if available]
# Version: [app version]
# Category:: [remote, local, webapps, dos, etc..]
# Tested on: [relevant os]
Send article to email : root@exploit-id.com