cookie

Мы используем файлы cookie для улучшения сервиса. Нажав кнопку «Принять все», вы соглашаетесь с использованием cookies.

avatar

Exploit Service

Exploit Service | BlackHat ZERO DAY'S EXPLOITS Everything is published for informational purposes only. Private: @ExploitServiceBot Exploit Developers: @ExploitDevs All Projects: @MalwareLinks Escrow: @MalwareEscrow

Больше
Рекламные посты
8 213
Подписчики
+1624 часа
+1037 дней
+35430 дней

Загрузка данных...

Прирост подписчиков

Загрузка данных...

Фото недоступноПоказать в Telegram
CVE-2024-32640 detection & Exploitation SQLi in Mura/Masa CMS https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Показать все...
Фото недоступноПоказать в Telegram
> Newest security update patches CVE-XXXX-XXXX The patch:
Показать все...
cve-2024-27956 WordPress Auto Admin Account Creation and Reverse Shell. Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Показать все...
WordPress_Auto_Admin_Account_and_Reverse_Shell_cve_2024_27956.zip0.03 KB
00:17
Видео недоступноПоказать в Telegram
Показать все...
IMG_1121.MP43.34 KB
CVE-2024-24919: Check Point arbitrary file read (as root) Blog: https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/ Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Показать все...
Check Point - Wrong Check Point (CVE-2024-24919)

Gather round, gather round - it’s time for another blogpost tearing open an SSLVPN appliance and laying bare a recent in-the-wild exploited bug. This time, it is Check Point who is the focus of our penetrative gaze. Check Point, for those unaware, is the vendor responsible for the 'CloudGuard

Фото недоступноПоказать в Telegram
🔔 Kodex Keylogger Remastered v1.0 Released 🔔 We're thrilled to share this exciting news with you. First and foremost, we want to thank everyone for their support and patience. What changed in the remastered version? Literally everything. The entire UI along with all features have been rewritten from scratch, fixed all existing issues. With the Remastered version, Kodex Keylogger is much better, stable, and powerful (all at the same price). You can click here to see all the changes in the update notes and visit this page to watch the video demonstration. We also prepared a public PDF to explain all features; you can take a look at it here. 🔔 Evil Extractor Remastered v1.3 Released 🔔 You can click here to see important bug fixes and newly added features. 🎁 In addition to this exciting news, as of today, we are offering a 15% discount on all of our products valid until the last day of June! You don't need to enter any discount code; the discount will be applied automatically. Best Regards, Kodex
Показать все...
Фото недоступноПоказать в Telegram
Here is my ad: The ad: Looking for reliable suppliers of Reddit cookies. Ready to buy all your cookies. My weekly budget is thousands of dollars. Покупаю куки Реддит, нужны надежные поставщики. Выкуплю весь ваш объем. В неделю выплачиваю моим поставщикам тысячи $ Dm @RedditChef
Показать все...
Фото недоступноПоказать в Telegram
CVE-2024-24919: Check Point arbitrary file read (as root) Blog: https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/ Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Показать все...
CVE-2024-26238: WINDOWS 10 PLUGSCHEDULER ELEVATION OF PRIVILEGE
C:\Windows\System32\SprintCSP.dll
https://www.synacktiv.com/advisories/windows-10-plugscheduler-elevation-of-privilege Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Показать все...
Windows 10 PLUGScheduler Elevation of Privilege

CVE-2024-22120: Time Based SQL Injection in Zabbix Server Audit Log
Affected and fixed version/s: * 6.0.0 - 6.0.27 / 6.0.28rc1 * 6.4.0 - 6.4.12 / 6.4.13rc1 * 7.0.0alpha1 - 7.0.0beta1 / 7.0.0beta2
Allows to dump any values from database. As an example of exploit above allows privilege escalation from user to admin. In some cases, SQL injection leads to RCE.
PoC: https://support.zabbix.com/secure/attachment/236280/236280_zabbix_server_time_based_blind_sqli.py Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Показать все...
Выберите другой тариф

Ваш текущий тарифный план позволяет посмотреть аналитику только 5 каналов. Чтобы получить больше, выберите другой план.