cookie

ما از کوکی‌ها برای بهبود تجربه مرور شما استفاده می‌کنیم. با کلیک کردن بر روی «پذیرش همه»، شما با استفاده از کوکی‌ها موافقت می‌کنید.

avatar

Exploit Service

Exploit Service | BlackHat ZERO DAY'S EXPLOITS Everything is published for informational purposes only. Private: @ExploitServiceBot Exploit Developers: @ExploitDevs All Projects: @MalwareLinks Escrow: @MalwareEscrow

نمایش بیشتر
پست‌های تبلیغاتی
8 485
مشترکین
+3224 ساعت
+2677 روز
+53530 روز

در حال بارگیری داده...

معدل نمو المشتركين

در حال بارگیری داده...

RWX_MEMEORY_HUNT_AND_INJECTION_DV OneDrive.exe + API-интерфейс = шелл-код (без выделения новой области памяти RWX) https://github.com/Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
نمایش همه...
GitHub - Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV: Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.

Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. - Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV

CVE-2024-27842 + CVE-2023-40404 macOS Sploit allows you to execute code at the kernel level POC exploit (для CVE-2024-27842) POC exploit (для CVE-2023-40404) Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
نمایش همه...
CVE-2024-2961 - тихоходка 2 Переполнение буфера в glibc's iconv Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
نمایش همه...
cve-2024-2961_cnext-exploits.zip0.08 KB
Photo unavailableShow in Telegram
CVE-2024-2961 - тихоходка Помните месяц назад был кипишь, относительно того что нашли дырку в glibc. Тогда многие хостеры еще напряглись. Но так как в широкий паблик ничего не уплыло, все успокоились. А ресёрчеры не успокоились, слишком вкусно пахло перспективным сплоитом. Ну так вот, на сцену вползает Iconv со своим RCE. Сегодня вышел отличный WriteUp (первая часть из трёх), который раскрывает только часть потенциала дыры 2961 https://www.ambionics.io/blog/iconv-cve-2024-2961-p1 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
نمایش همه...
Photo unavailableShow in Telegram
Linux Kernel Teaching. Laboratory Большой и годный сборник лекций и лабораторных работ по ядру Linux. Лекции посвящены теоретическому исследованию ядра Linux. Лабораторки сделаны в стиле инструкций. Будет полезно: админам, драйверописателям и руткитоварам https://linux-kernel-labs.github.io/refs/heads/master/index.html Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
نمایش همه...
Photo unavailableShow in Telegram
Finding, analyzing and exploiting stack buffer overflow in the netfilter subsystem from the softirq context. https://betrusted.it/blog/64-bytes-and-a-rop-chain-part-1/ https://betrusted.it/blog/64-bytes-and-a-rop-chain-part-2/ Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
نمایش همه...
Photo unavailableShow in Telegram
CVE-2024-21683 Confluence Data Center and Server RCE https://github.com/absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server/ Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
نمایش همه...
Photo unavailableShow in Telegram
👀Forget about SmartScreen👀 ⭐️[SALE 2500$ ONE-TIME 350$]⭐️ ✍️EV Code Signing ✍️ No Malware scan 🦠 Valid Sign✅ Remote Access 📡 No Smart Screen 📺 In stock - Pre-order🪤 Hot Topics🏖 https://forum.exploit.in/topic/239556 https://xss.is/threads/110863 Bot for orders🎯 https://t.me/D3Fuck_Loader_bot
نمایش همه...
CVE-2024-27130 RCE on a vulnerable QNAP device. https://github.com/watchtowrlabs/CVE-2024-27130 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
نمایش همه...
GitHub - watchtowrlabs/CVE-2024-27130: PoC for CVE-2024-27130

PoC for CVE-2024-27130. Contribute to watchtowrlabs/CVE-2024-27130 development by creating an account on GitHub.

نمایش همه...
MalwareLinks

You’ve been invited to add the folder “MalwareLinks”, which includes 38 chats.

یک طرح متفاوت انتخاب کنید

طرح فعلی شما تنها برای 5 کانال تجزیه و تحلیل را مجاز می کند. برای بیشتر، لطفا یک طرح دیگر انتخاب کنید.