Exploit Service
Exploit Service | BlackHat ZERO DAY'S EXPLOITS Everything is published for informational purposes only. Link: @exploitservice Private: @ExploitServiceBot Exploit Developers: @ExploitDevs All Projects: @MalwareLinks Escrow: @MalwareEscrow
Show more- Subscribers
- Post coverage
- ER - engagement ratio
Data loading in progress...
Data loading in progress...
The only one contact to start work: @stop
62340
Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849) - sinsinology/CVE-2024-29849
762140
Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800) - sinsinology/CVE-2024-4358
805120
C:\Windows\System32\SprintCSP.dllhttps://www.synacktiv.com/advisories/windows-10-plugscheduler-elevation-of-privilege Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
840190
88070
This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to steal data, modify data, or disrupt the availability of the s...
898150
PoC for CVE-2024-27130. Contribute to watchtowrlabs/CVE-2024-27130 development by creating an account on GitHub.
997140
PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855 - sinsinology/CVE-2024-29855
1 081140
1 115170
Your current plan allows analytics for only 5 channels. To get more, please choose a different plan.