We are developing an Excel plug-in, and wish to evaluate the vulnerabilities in that type of application.
We wish to have a competent hacker defeat the security mechanism (trial period and unlock code) of a similar plug-in. The deliverable with be a tutorial describing every step of the exploit so that we are able to reproduce it as well as a discussion of the vulnerability and how you would correct it.
If you are interested, please document your experience. We will then point you to the target application. After review, you may finalize your bid. We are willing to retain several teams for this project. As part of the deliverable, developer must agree never to release any part of the security bypass to the public.