cookie

We use cookies to improve your browsing experience. By clicking «Accept all», you agree to the use of cookies.

avatar

Exploit Service

Exploit Service | BlackHat ZERO DAY'S EXPLOITS Everything is published for informational purposes only. Link: @exploitservice Private: @ExploitServiceBot Exploit Developers: @ExploitDevs All Projects: @MalwareLinks Escrow: @MalwareEscrow

Show more
Advertising posts
8 750
Subscribers
+724 hours
+1157 days
+66330 days

Data loading in progress...

Subscriber growth rate

Data loading in progress...

Show all...
Angel Drainer

The only one contact to start work: @stop

#Veeam Backup Enterprise Manager Authentication Bypass (#CVE-2024-29849) https://github.com/sinsinology/CVE-2024-29849 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Show all...
GitHub - sinsinology/CVE-2024-29849: Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)

Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849) - sinsinology/CVE-2024-29849

Server pre-authenticated #RCE chain (#CVE-2024-4358/CVE-2024-1800) https://github.com/sinsinology/CVE-2024-4358 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Show all...
GitHub - sinsinology/CVE-2024-4358: Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)

Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800) - sinsinology/CVE-2024-4358

#CVE-2024-26238: #WINDOWS 10 PLUGSCHEDULER ELEVATION OF PRIVILEGE
C:\Windows\System32\SprintCSP.dll
https://www.synacktiv.com/advisories/windows-10-plugscheduler-elevation-of-privilege Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Show all...
Windows 10 PLUGScheduler Elevation of Privilege

  • Photo unavailable
  • Photo unavailable
🕊 Обновление 7.07 RU 🇷🇺 1. Интегрирован в панель собственный lnk билдер (доступен только в тарифе Корпоративный) - для точечных атак функционал подойдет идеально. На данный момент разработка на стадии тестирования, иконка файла только PDF 2. Добавлено ограничение для тега билда 3. Исправлена ошибка когда конфиг мог скрывать правила добавленные пользователем 4. Добавлена возможность полностью менять конфиг 5. Чистка Windows Defender 10/11 + Cloud 🕊 Update 7.07 EN 🇬🇧 1. Integrated into the panel own lnk builder (available only in the Corporate plan) - the functionality is ideal for targeted attacks. At the moment the development is at the testing stage, the file icon is only PDF 2. Added restriction for build tag 3. Fixed a bug where the config could hide rules added by the user 4. Added the ability to completely change the config 5. Cleaning Windows Defender 10/11 + Cloud Купить подписку / Buy subscription - @lummaseller126 Полное описание LummaC2 (КЛИК) Full description of LummaC2 (CLICK) Чат / Chat
Show all...
Show all...
GitHub - absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server: This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to steal data, modify data, or disrupt the availability of the server.

This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to steal data, modify data, or disrupt the availability of the s...

Show all...
GitHub - watchtowrlabs/CVE-2024-27130: PoC for CVE-2024-27130

PoC for CVE-2024-27130. Contribute to watchtowrlabs/CVE-2024-27130 development by creating an account on GitHub.

Photo unavailable
ExploitPack Pro 17.05 @ExploitServiceBot
Show all...
#Veeam Recovery Orchestrator Authentication #CVE-2024-29855 https://github.com/sinsinology/CVE-2024-29855 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Show all...
GitHub - sinsinology/CVE-2024-29855: PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855

PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855 - sinsinology/CVE-2024-29855

Photo unavailable
CVE-2024-4577 - Yet Another #PHP #RCE: Make PHP-CGI Argument Injection Great Again! https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html https://github.com/TAM-K592/CVE-2024-4577 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Show all...
Choose a Different Plan

Your current plan allows analytics for only 5 channels. To get more, please choose a different plan.