Terms & Conditions

Last updated: February 03, 2025
Please read these terms and conditions carefully before using Our Service.

Interpretation and Definitions

Interpretation

The words of which the initial letter is capitalized have meanings defined under the following conditions. The following definitions shall have the same meaning regardless of whether they appear in singular or in plural.

Definitions

For the purposes of these Terms and Conditions:

  • Affiliate means an entity that controls, is controlled by or is under common control with a party, where "control" means ownership of 50% or more of the shares, equity interest or other securities entitled to vote for election of directors or other managing authority.

  • Country refers to: Romania

  • Company (referred to as either "the Company", "We", "Us" or "Our" in this Agreement) refers to ZERODAY TECHNOLOGIES S.R.L., Bucharest, Romania.

  • Device means any device that can access the Service such as a computer, a cellphone or a digital tablet.

  • Service refers to the Website.

  • Terms and Conditions (also referred as "Terms") mean these Terms and Conditions that form the entire agreement between You and the Company regarding the use of the Service. This Terms and Conditions agreement has been created with the help of the Terms and Conditions Generator.

  • Third-party Social Media Service means any services or content (including data, information, products or services) provided by a third-party that may be displayed, included or made available by the Service.

  • Website refers to Zer0 Day Technologies, accessible from https://zer0day.ro

  • You means the individual accessing or using the Service, or the company, or other legal entity on behalf of which such individual is accessing or using the Service, as applicable.

Acknowledgment

These are the Terms and Conditions governing the use of this Service and the agreement that operates between You and the Company. These Terms and Conditions set out the rights and obligations of all users regarding the use of the Service.

Your access to and use of the Service is conditioned on Your acceptance of and compliance with these Terms and Conditions. These Terms and Conditions apply to all visitors, users and others who access or use the Service.

By accessing or using the Service You agree to be bound by these Terms and Conditions. If You disagree with any part of these Terms and Conditions then You may not access the Service.

You represent that you are over the age of 18. The Company does not permit those under 18 to use the Service.

Your access to and use of the Service is also conditioned on Your acceptance of and compliance with the Privacy Policy of the Company. Our Privacy Policy describes Our policies and procedures on the collection, use and disclosure of Your personal information when You use the Application or the Website and tells You about Your privacy rights and how the law protects You. Please read Our Privacy Policy carefully before using Our Service.

Links to Other Websites

Our Service may contain links to third-party web sites or services that are not owned or controlled by the Company.

The Company has no control over, and assumes no responsibility for, the content, privacy policies, or practices of any third party web sites or services. You further acknowledge and agree that the Company shall not be responsible or liable, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any such content, goods or services available on or through any such web sites or services.

We strongly advise You to read the terms and conditions and privacy policies of any third-party web sites or services that You visit.

Termination

We may terminate or suspend Your access immediately, without prior notice or liability, for any reason whatsoever, including without limitation if You breach these Terms and Conditions.

Upon termination, Your right to use the Service will cease immediately.

Limitation of Liability

Notwithstanding any damages that You might incur, the entire liability of the Company and any of its suppliers under any provision of this Terms and Your exclusive remedy for all of the foregoing shall be limited to the amount actually paid by You through the Service or 100 USD if You haven't purchased anything through the Service.

To the maximum extent permitted by applicable law, in no event shall the Company or its suppliers be liable for any special, incidental, indirect, or consequential damages whatsoever (including, but not limited to, damages for loss of profits, loss of data or other information, for business interruption, for personal injury, loss of privacy arising out of or in any way related to the use of or inability to use the Service, third-party software and/or third-party hardware used with the Service, or otherwise in connection with any provision of this Terms), even if the Company or any supplier has been advised of the possibility of such damages and even if the remedy fails of its essential purpose.

Some states do not allow the exclusion of implied warranties or limitation of liability for incidental or consequential damages, which means that some of the above limitations may not apply. In these states, each party's liability will be limited to the greatest extent permitted by law.

"AS IS" and "AS AVAILABLE" Disclaimer

The Service is provided to You "AS IS" and "AS AVAILABLE" and with all faults and defects without warranty of any kind. To the maximum extent permitted under applicable law, the Company, on its own behalf and on behalf of its Affiliates and its and their respective licensors and service providers, expressly disclaims all warranties, whether express, implied, statutory or otherwise, with respect to the Service, including all implied warranties of merchantability, fitness for a particular purpose, title and non-infringement, and warranties that may arise out of course of dealing, course of performance, usage or trade practice. Without limitation to the foregoing, the Company provides no warranty or undertaking, and makes no representation of any kind that the Service will meet Your requirements, achieve any intended results, be compatible or work with any other software, applications, systems or services, operate without interruption, meet any performance or reliability standards or be error free or that any errors or defects can or will be corrected.

Without limiting the foregoing, neither the Company nor any of the company's provider makes any representation or warranty of any kind, express or implied: (i) as to the operation or availability of the Service, or the information, content, and materials or products included thereon; (ii) that the Service will be uninterrupted or error-free; (iii) as to the accuracy, reliability, or currency of any information or content provided through the Service; or (iv) that the Service, its servers, the content, or e-mails sent from or on behalf of the Company are free of viruses, scripts, trojan horses, worms, malware, timebombs or other harmful components.

Some jurisdictions do not allow the exclusion of certain types of warranties or limitations on applicable statutory rights of a consumer, so some or all of the above exclusions and limitations may not apply to You. But in such a case the exclusions and limitations set forth in this section shall be applied to the greatest extent enforceable under applicable law.

Governing Law

The laws of the Country, excluding its conflicts of law rules, shall govern this Terms and Your use of the Service. Your use of the Application may also be subject to other local, state, national, or international laws.

Disputes Resolution

If You have any concern or dispute about the Service, You agree to first try to resolve the dispute informally by contacting the Company.

For European Union (EU) Users

If You are a European Union consumer, you will benefit from any mandatory provisions of the law of the country in which You are resident.

United States Legal Compliance

You represent and warrant that (i) You are not located in a country that is subject to the United States government embargo, or that has been designated by the United States government as a "terrorist supporting" country, and (ii) You are not listed on any United States government list of prohibited or restricted parties.

Severability and Waiver

Severability

If any provision of these Terms is held to be unenforceable or invalid, such provision will be changed and interpreted to accomplish the objectives of such provision to the greatest extent possible under applicable law and the remaining provisions will continue in full force and effect.

Waiver

Except as provided herein, the failure to exercise a right or to require performance of an obligation under these Terms shall not affect a party's ability to exercise such right or require such performance at any time thereafter nor shall the waiver of a breach constitute a waiver of any subsequent breach.

Translation Interpretation

These Terms and Conditions may have been translated if We have made them available to You on our Service. You agree that the original English text shall prevail in the case of a dispute.

Changes to These Terms and Conditions

We reserve the right, at Our sole discretion, to modify or replace these Terms at any time. If a revision is material We will make reasonable efforts to provide at least 30 days' notice prior to any new terms taking effect. What constitutes a material change will be determined at Our sole discretion.

By continuing to access or use Our Service after those revisions become effective, You agree to be bound by the revised terms. If You do not agree to the new terms, in whole or in part, please stop using the website and the Service.

Contact Us

If you have any questions about these Terms and Conditions, You can contact us:

  • By email: office@zer0day.ro

  • By phone number: +40 740 161 401

GDPR Consulting

GDPR Consulting

In today’s digital world, GDPR compliance is not just a legal requirement but also a key factor in building trust and credibility for your online business. We provide professional GDPR documentation services to ensure your business is fully compliant with the latest data protection regulations across Europe. Essential GDPR Documents for Your Business ✅ Privacy Policy – Clearly explains how you collect, store, and process user data. ✅ Terms & Conditions – Defines the rules of website usage, user rights, and responsibilities. ✅ Data Processing Agreement (DPA) – Required if you share user data with third-party service providers (e.g., email marketing, hosting, analytics). ✅ Cookie Policy – Ensures proper disclosure and consent management for cookies used on your site. Why Is GDPR Compliance Important? 🔹 Avoid heavy fines – Non-compliance can result in penalties of up to €20 million or 4% of annual turnover. 🔹 Build customer trust – Transparency in data protection enhances your reputation. 🔹 Protect your business – Ensure your website is legally secure and compliant. 🔹 SEO benefits – Google favors GDPR-compliant websites, improving search rankings and visibility. How It Works 1️⃣ Share details about your website/application and business. 2️⃣ We draft custom GDPR-compliant documents tailored to your needs. 3️⃣ Integrate them into your website and ensure full legal protection. Ensure your business is GDPR-compliant and legally secure! Contact our partner today for a free consultation.

DevSecOps

DevSecOps

In modern software development, security cannot be an afterthought. At Zero Day Technologies, we integrate security into every stage of the software development lifecycle (SDLC), ensuring that vulnerabilities are detected and mitigated before deployment. Our DevSecOps approach enables organizations to shift security left, reducing risks while maintaining agility, speed, and compliance in CI/CD pipelines. Secure Code Reviews – Identifying vulnerabilities in source code before they reach production. 🔹 Automated Security Testing – Integrating SAST, DAST, and IAST into CI/CD pipelines for real-time security assessments. 🔹 Container & Cloud Security – Securing Docker, Kubernetes, AWS, Azure, and GCP environments. 🔹 Infrastructure as Code (IaC) Security – Ensuring secure deployment of Terraform, Ansible, and Kubernetes configurations. 🔹 Supply Chain & Dependency Security – Auditing third-party libraries, open-source components, and package dependencies to prevent supply chain attacks. ✔ By integrating security early, we help developers catch vulnerabilities before they become costly exploits. A compromised CI/CD pipeline can lead to source code leaks, unauthorized deployments, and production takeovers. Our DevSecOps services ensure that your pipeline is hardened against threats and that security is automated, scalable, and continuous. 🔍 Secrets & Credential Management – Preventing API keys, passwords, and tokens from being exposed in repositories. 🔍 Automated Compliance Checks – Enforcing security policies and regulatory compliance (GDPR, ISO 27001, NIST). 🔍 Runtime Protection & Continuous Monitoring – Ensuring real-time threat detection and logging across production environments. 🔍 Privileged Access & Role-Based Security – Implementing least privilege principles for DevOps teams and services. ✔ Security doesn’t slow down development—it strengthens and streamlines it. At Zero Day Technologies, we don’t just implement security controls—we help you build a security-first culture within your development teams. Our DevSecOps consulting services provide: 📌 Customized DevSecOps Strategy – Tailoring security solutions to your development workflow. 📌 Security Toolchain Integration – Implementing the right security tools without slowing down development. 📌 Continuous Security Assessments – Regular testing and improvements to keep up with evolving threats. 📌 Developer Security Training – Educating DevOps teams on secure development, API security, and cloud security best practices.

Web Application Security

Web Application Security

Web applications are a prime target for attackers, often containing critical vulnerabilities that can lead to data breaches, account takeovers, and full system compromise. At Zero Day Technologies, we conduct comprehensive Web Application Security Assessments, leveraging White Box, Grey Box, and Black Box testing methodologies to uncover logic flaws, misconfigurations, and security weaknesses before attackers do. Our web application penetration testing process is aligned with OWASP Top 10, SANS 25, and industry best practices, ensuring that both common and advanced security flaws are identified and mitigated. 🔍 Injection Attacks (SQL, NoSQL, XXE, Command Injection) – Testing for direct code execution vulnerabilities that could lead to data exfiltration or system compromise. 🔍 Broken Authentication & Authorization – Assessing session management, token handling, and access controls to prevent unauthorized privilege escalation. 🔍 Cross-Site Scripting (XSS) & Cross-Site Request Forgery (CSRF) – Identifying client-side attacks that could be used for data theft and user impersonation. 🔍 Business Logic Flaws – Discovering flawed workflows, insecure payment processing, and improper access restrictions that attackers can manipulate. 🔍 Server-Side Request Forgery (SSRF) & API Security Issues – Evaluating internal service exposure, cloud misconfigurations, and insecure API endpoints. 🔍 Supply Chain & Dependency Vulnerabilities – Auditing third-party libraries, open-source components, and outdated software dependencies for known exploits. 🔹 We go beyond automated scanning—our manual exploitation techniques ensure that even zero-day vulnerabilities and custom business logic flaws are uncovered. At Zero Day Technologies, we don’t just find vulnerabilities—we help you fix them. Our Web Application Security Testing includes: 📌 Detailed Exploit Reports – Comprehensive documentation of vulnerabilities with clear proof-of-concept (PoC) exploits. 📌 OWASP Risk-Based Scoring – Aligning each vulnerability with a risk impact analysis for prioritized remediation. 📌 Secure Development Guidance – Providing best practices for secure coding, DevSecOps integration, and CI/CD security improvements. 📌 Re-Testing & Continuous Monitoring – Ensuring that fixed vulnerabilities remain resolved and new threats are proactively mitigated.

Active Directory Penetration Tests

Active Directory Penetration Tests

Active Directory (AD) is the backbone of enterprise identity and access management, but misconfigurations, excessive privileges, and weak Group Policy Objects (GPOs) often provide attackers with easy pathways to domain dominance. At Zero Day Technologies, we conduct comprehensive Active Directory Penetration Tests to identify security gaps, privilege escalation paths, and misconfigurations that could be exploited by real-world attackers. We simulate two types of engagements based on real-world attack scenarios: ✔ Assumed Breach Engagements – Simulating an attacker who has already gained an initial foothold within the network, testing lateral movement, privilege escalation, and domain persistence. ✔ Full Engagements – Starting from an external attacker’s perspective, using OSINT, phishing, and perimeter weaknesses to infiltrate the Active Directory environment. We follow real-world attacker methodologies using a combination of custom tooling and open-source offensive security frameworks to simulate Advanced Persistent Threats (APTs). ✔ Advanced Credential Attacks – Extracting hashes, abusing NTLM relay, and conducting golden ticket attacks. ✔ Detection Evasion – Bypassing SIEM alerts, EDR monitoring, and endpoint security controls. ✔ C2 Operations & Persistence – Deploying custom implants to test long-term access persistence. ✔ Custom Payloads & Living-Off-The-Land (LotL) Techniques – Using legitimate tools like PowerShell, WMI, and LOLBins to blend into normal activity. At Zero Day Technologies, we don’t just exploit weaknesses—we help you fix them. Our Active Directory Penetration Testing services include: 📌 Comprehensive Risk Reports – Detailed documentation of vulnerabilities, misconfigurations, and attack paths. 📌 MITRE ATT&CK Mapping – Aligning our findings with real-world adversary tactics and techniques. 📌 Actionable Remediation Strategies – Step-by-step guidance to mitigate security risks and harden AD defenses. 📌 Purple Teaming & Blue Team Collaboration – Working alongside your security team to improve detection, response, and prevention capabilities.

Network Security

Network Security

A single misconfiguration or unpatched service can provide an entry point for attackers. Our network security experts conduct in-depth vulnerability assessments to detect and analyze: ✔ Unpatched Systems & Software Vulnerabilities – Identifying CVEs, outdated software, and misconfigured services. ✔ Network Misconfigurations – Detecting open ports, weak firewall rules, and improperly segmented networks. ✔ Weak Authentication Mechanisms – Auditing password policies, exposed credentials, and authentication protocols. ✔ Exposed Services & Protocol Weaknesses – Evaluating web servers, databases, remote access services, and cloud deployments. 🔹 We don’t just find vulnerabilities—we provide actionable solutions to secure your network against exploitation. Even the most hardened systems can contain hidden security gaps that attackers can exploit. Our network penetration testing services simulate real-world attack scenarios, testing firewalls, IDS/IPS, VPNs, and endpoint security solutions to determine their true resilience. 🔹 Firewall & Perimeter Security Testing – Evaluating firewall rule sets, bypassing ACLs, and testing for unauthorized access. 🔹 VPN Security Assessments – Identifying misconfigurations, weak encryption, and vulnerabilities in remote access solutions. 🔹 Wireless Network Testing – Simulating rogue AP attacks, WPA cracking, and exploiting weak Wi-Fi security configurations. 🔹 Network Segmentation Testing – Ensuring critical assets are properly isolated and access control is enforced. ✔ We go beyond automated scanning—our manual penetration testing techniques identify vulnerabilities that evade traditional security tools.

Red Team Engagements

Red Team Engagements

At Zero Day Technologies, our Red Team Engagements go beyond traditional security assessments. We conduct full-spectrum adversary emulation to simulate Advanced Persistent Threats (APTs), targeting your organization with the same tactics, techniques, and procedures (TTPs) used by real-world attackers. Our objective is to test, challenge, and enhance your security posture by identifying blind spots, response gaps, and weaknesses in detection and mitigation strategies. Our Red Team is equipped to evade and bypass cutting-edge security solutions, including: ✔ Next-Gen Firewalls (NGFW) – Circumventing traffic inspection and anomaly detection. ✔ Endpoint Detection & Response (EDR) – Deploying stealthy, memory-resident payloads that bypass behavioral analysis. ✔ Security Information & Event Management (SIEM) – Crafting low-noise attacks that remain undetected in security logs. ✔ Multi-Factor Authentication (MFA) Bypass – Exploiting session hijacking, token manipulation, and adversary-in-the-middle (AITM) attacks. ✔ Zero Trust Implementations – Finding weaknesses in identity management, micro-segmentation, and policy enforcement. Our Red Team Engagements do not stop at identifying vulnerabilities; we challenge your detection, response, and containment capabilities. After every engagement, we provide: 📌 Comprehensive attack debriefs – Mapping our findings to MITRE ATT&CK and demonstrating real-world impact. 📌 Detailed remediation strategies – Offering actionable solutions to improve your blue team’s defensive capabilities. 📌 Purple Teaming sessions – Collaborating with your security team to improve detection rules, SIEM alerts, and SOC response playbooks. Red Team Engagements are not just about breaking in—they're about building a stronger defense. Our goal is to help your organization evolve its security maturity, adapt to modern threats, and ensure readiness against real-world attacks. Is your security team prepared for a real-world cyber attack? Contact Zero Day Technologies today to schedule a Red Team Engagement.