If it's connected, we can break into it.   Downloads  |  About Us  |  Contact  |  Careers  |  News  | 

 Emergency  |  SanityCheck|  Penetration Test |  Risk Assessment | Product Testing | Security Solutions |
  Check your security NOW!
  Latest Security News 
"So in war, the way is to avoid what is strong and to strike what is weak."  - Sun Tzu, The Art of War

Privacy policy

Modern information and communication technologies play a fundamental role in the activities of an organization like Greyhat. Protecting your privacy and your personal data is an important aspect of the way we create, organize and implement our activities on-line and off-line.

Greyhat only collects data that is volunteered by the user via email or via our on-line submission forms. The information will be known to only two parties: you and Greyhat. We will not release your data to anyone else without your consent.

Please contact us if you have any questions regarding our Privacy Policy.

Greyhat LLC   © 1998-2005  All Rights Reserved Worldwide   | Is Hacking legal? | WhatisGreyhat | Legal | Privacy |
Updated 03.27.05  dated