cookie

نحن نستخدم ملفات تعريف الارتباط لتحسين تجربة التصفح الخاصة بك. بالنقر على "قبول الكل"، أنت توافق على استخدام ملفات تعريف الارتباط.

avatar

Exploit Service

Exploit Service | BlackHat ZERO DAY'S EXPLOITS Everything is published for informational purposes only. Link: @exploitservice Private: @ExploitServiceBot Exploit Developers: @ExploitDevs All Projects: @MalwareLinks Escrow: @MalwareEscrow

إظهار المزيد
مشاركات الإعلانات
8 747
المشتركون
+1224 ساعات
+1587 أيام
+67130 أيام

جاري تحميل البيانات...

معدل نمو المشترك

جاري تحميل البيانات...

إظهار الكل...
Angel Drainer

The only one contact to start work: @stop

#Veeam Backup Enterprise Manager Authentication Bypass (#CVE-2024-29849) https://github.com/sinsinology/CVE-2024-29849 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
إظهار الكل...
GitHub - sinsinology/CVE-2024-29849: Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)

Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849) - sinsinology/CVE-2024-29849

Server pre-authenticated #RCE chain (#CVE-2024-4358/CVE-2024-1800) https://github.com/sinsinology/CVE-2024-4358 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
إظهار الكل...
GitHub - sinsinology/CVE-2024-4358: Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)

Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800) - sinsinology/CVE-2024-4358

#CVE-2024-26238: #WINDOWS 10 PLUGSCHEDULER ELEVATION OF PRIVILEGE
C:\Windows\System32\SprintCSP.dll
https://www.synacktiv.com/advisories/windows-10-plugscheduler-elevation-of-privilege Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
إظهار الكل...
Windows 10 PLUGScheduler Elevation of Privilege

  • Photo unavailable
  • Photo unavailable
🕊 Обновление 7.07 RU 🇷🇺 1. Интегрирован в панель собственный lnk билдер (доступен только в тарифе Корпоративный) - для точечных атак функционал подойдет идеально. На данный момент разработка на стадии тестирования, иконка файла только PDF 2. Добавлено ограничение для тега билда 3. Исправлена ошибка когда конфиг мог скрывать правила добавленные пользователем 4. Добавлена возможность полностью менять конфиг 5. Чистка Windows Defender 10/11 + Cloud 🕊 Update 7.07 EN 🇬🇧 1. Integrated into the panel own lnk builder (available only in the Corporate plan) - the functionality is ideal for targeted attacks. At the moment the development is at the testing stage, the file icon is only PDF 2. Added restriction for build tag 3. Fixed a bug where the config could hide rules added by the user 4. Added the ability to completely change the config 5. Cleaning Windows Defender 10/11 + Cloud Купить подписку / Buy subscription - @lummaseller126 Полное описание LummaC2 (КЛИК) Full description of LummaC2 (CLICK) Чат / Chat
إظهار الكل...
إظهار الكل...
GitHub - absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server: This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to steal data, modify data, or disrupt the availability of the server.

This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to steal data, modify data, or disrupt the availability of the s...

إظهار الكل...
GitHub - watchtowrlabs/CVE-2024-27130: PoC for CVE-2024-27130

PoC for CVE-2024-27130. Contribute to watchtowrlabs/CVE-2024-27130 development by creating an account on GitHub.

Photo unavailable
ExploitPack Pro 17.05 @ExploitServiceBot
إظهار الكل...
#Veeam Recovery Orchestrator Authentication #CVE-2024-29855 https://github.com/sinsinology/CVE-2024-29855 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
إظهار الكل...
GitHub - sinsinology/CVE-2024-29855: PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855

PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855 - sinsinology/CVE-2024-29855

Photo unavailable
CVE-2024-4577 - Yet Another #PHP #RCE: Make PHP-CGI Argument Injection Great Again! https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html https://github.com/TAM-K592/CVE-2024-4577 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
إظهار الكل...
اختر خطة مختلفة

تسمح خطتك الحالية بتحليلات لما لا يزيد عن 5 قنوات. للحصول على المزيد، يُرجى اختيار خطة مختلفة.