HackScale welcomes exploit developers, malware researchers, offensive security engineers, and red team builders.
If you have a project, proof-of-concept, tool, lab, or research idea related to offensive security, you can submit it for technical review.
Accepted projects may be:
- Featured under the HackScale organization
- Maintained with the original researcher
- Credited publicly across repositories and announcements
- Considered for contributor or core member invitation
We currently review:
- Exploit development research
- Proof-of-concepts (PoCs)
- DLL hijacking labs
- Malware analysis utilities
- Red team automation
- Adversary emulation labs
- Privilege escalation research
- EDR bypass simulations
- Offensive tooling
- Detection engineering test labs
- Submit your project through Issues
- Include full technical documentation
- Our team validates it in a safe lab environment
- If approved, it may be featured under HackScale
- Top contributors may receive an invitation to join the organization
Every accepted project includes:
- Researcher mention
- Repository credits
- Commit attribution
- Public acknowledgment
- Future collaboration opportunities
HackScale only accepts projects intended for:
- Ethical hacking
- Research
- Lab simulation
- Detection testing
- Defensive validation