cookie

Utilizamos cookies para mejorar tu experiencia de navegación. Al hacer clic en "Aceptar todo", aceptas el uso de cookies.

avatar

Exploit Service

Exploit Service | BlackHat ZERO DAY'S EXPLOITS Everything is published for informational purposes only. Link: @exploitservice Private: @ExploitServiceBot Exploit Developers: @ExploitDevs All Projects: @MalwareLinks Escrow: @MalwareEscrow

Mostrar más
Publicaciones publicitarias
8 750
Suscriptores
+724 horas
+1157 días
+66330 días

Carga de datos en curso...

Tasa de crecimiento de suscriptores

Carga de datos en curso...

Mostrar todo...
Angel Drainer

The only one contact to start work: @stop

#Veeam Backup Enterprise Manager Authentication Bypass (#CVE-2024-29849) https://github.com/sinsinology/CVE-2024-29849 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Mostrar todo...
GitHub - sinsinology/CVE-2024-29849: Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)

Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849) - sinsinology/CVE-2024-29849

Server pre-authenticated #RCE chain (#CVE-2024-4358/CVE-2024-1800) https://github.com/sinsinology/CVE-2024-4358 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Mostrar todo...
GitHub - sinsinology/CVE-2024-4358: Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)

Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800) - sinsinology/CVE-2024-4358

#CVE-2024-26238: #WINDOWS 10 PLUGSCHEDULER ELEVATION OF PRIVILEGE
C:\Windows\System32\SprintCSP.dll
https://www.synacktiv.com/advisories/windows-10-plugscheduler-elevation-of-privilege Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Mostrar todo...
Windows 10 PLUGScheduler Elevation of Privilege

  • Photo unavailable
  • Photo unavailable
🕊 Обновление 7.07 RU 🇷🇺 1. Интегрирован в панель собственный lnk билдер (доступен только в тарифе Корпоративный) - для точечных атак функционал подойдет идеально. На данный момент разработка на стадии тестирования, иконка файла только PDF 2. Добавлено ограничение для тега билда 3. Исправлена ошибка когда конфиг мог скрывать правила добавленные пользователем 4. Добавлена возможность полностью менять конфиг 5. Чистка Windows Defender 10/11 + Cloud 🕊 Update 7.07 EN 🇬🇧 1. Integrated into the panel own lnk builder (available only in the Corporate plan) - the functionality is ideal for targeted attacks. At the moment the development is at the testing stage, the file icon is only PDF 2. Added restriction for build tag 3. Fixed a bug where the config could hide rules added by the user 4. Added the ability to completely change the config 5. Cleaning Windows Defender 10/11 + Cloud Купить подписку / Buy subscription - @lummaseller126 Полное описание LummaC2 (КЛИК) Full description of LummaC2 (CLICK) Чат / Chat
Mostrar todo...
Mostrar todo...
GitHub - absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server: This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to steal data, modify data, or disrupt the availability of the server.

This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to steal data, modify data, or disrupt the availability of the s...

Mostrar todo...
GitHub - watchtowrlabs/CVE-2024-27130: PoC for CVE-2024-27130

PoC for CVE-2024-27130. Contribute to watchtowrlabs/CVE-2024-27130 development by creating an account on GitHub.

Photo unavailable
ExploitPack Pro 17.05 @ExploitServiceBot
Mostrar todo...
#Veeam Recovery Orchestrator Authentication #CVE-2024-29855 https://github.com/sinsinology/CVE-2024-29855 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Mostrar todo...
GitHub - sinsinology/CVE-2024-29855: PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855

PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855 - sinsinology/CVE-2024-29855

Photo unavailable
CVE-2024-4577 - Yet Another #PHP #RCE: Make PHP-CGI Argument Injection Great Again! https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html https://github.com/TAM-K592/CVE-2024-4577 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Mostrar todo...
Elige un Plan Diferente

Tu plan actual sólo permite el análisis de 5 canales. Para obtener más, elige otro plan.