• XSS.stack #1 – первый литературный журнал от юзеров форума

[SELL] Exploits (0-day & 1-day. RCE. LPE. VPN RCEs. IoT Exploits)

В этой теме можно использовать автоматический гарант!

Статус
Закрыто для дальнейших ответов.
Пожалуйста, обратите внимание, что пользователь заблокирован
+ Windows LPE (CVE-2024-26169), March 2024

+ Microsoft Outlook RCE (CVE-2024-21413) - private and upgraded version (added suport for unautheticated SMTP servers)

+ GlobalProtect RCE (CVE-2024-3400)

+ Fortinet FortiOS RCE (CVE-2024-21762)

+ ScreenConnect RCE (CVE-2024-1709)

+ Ivanti Exploit (CVE-2024-21893)

+ Jenkins Exploit (CVE-2024-23897)

+ JetBrains RCE (CVE-2024-27198)

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from C2. The source codes of the exploits are also given.

Contact with PM.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
+ Exim RCE (CVE-2023-42115)

+ Windows LPE (CVE-2024-26169)

+ Microsoft Outlook RCE (CVE-2024-21413) - private and upgraded version (added suport for unautheticated SMTP servers)

+ GlobalProtect RCE (CVE-2024-3400)

+ Fortinet FortiOS RCE (CVE-2024-21762)

+ CrushFTP RCE (CVE-2024-4040)

+ ScreenConnect RCE (CVE-2024-1709)

+ Jenkins Exploit (CVE-2024-23897)

+ JetBrains RCE (CVE-2024-27198)

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from C2. The source codes of the exploits are also given.

Contact with PM.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
+ Exim RCE (CVE-2023-42115)

+ Windows LPE (CVE-2024-26169)

+ Microsoft Outlook RCE (CVE-2024-21413) - private and upgraded version (added suport for unautheticated SMTP servers)

+ GlobalProtect RCE (CVE-2024-3400)

+ Fortinet FortiOS RCE (CVE-2024-21762)

+ CrushFTP RCE (CVE-2024-4040)

+ ScreenConnect RCE (CVE-2024-1709)

+ Jenkins Exploit (CVE-2024-23897)

+ JetBrains RCE (CVE-2024-27198)

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from C2. The source codes of the exploits are also given.

Contact with PM.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
+ Exim RCE (CVE-2023-42115)

+ Windows LPE (CVE-2024-26169)

+ Check Point VPN Arbitrary Read Exploit (CVE-2024-24919)

+ Microsoft Outlook RCE (CVE-2024-21413) - private and upgraded version (added suport for unautheticated SMTP servers)

+ GlobalProtect RCE (CVE-2024-3400)

+ Fortinet FortiOS RCE (CVE-2024-21762)

+ CrushFTP RCE (CVE-2024-4040)

+ ScreenConnect RCE (CVE-2024-1709)

+ JetBrains RCE (CVE-2024-27198)

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from C2. The source codes of the exploits are also given.

Contact with PM.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
+ Exim RCE (CVE-2023-42115)

+ Windows LPE (CVE-2024-26169)

+ PHP RCE, all Windows versions (CVE-2024-4577)

+ Apache RCE (CVE-2024-27348)

+ Veeam Exploit (CVE-2024-29849)

+ Check Point VPN Arbitrary Read Exploit (CVE-2024-24919)

+ Microsoft Outlook RCE (CVE-2024-21413) - private and upgraded version (added suport for unautheticated SMTP servers)

+ GlobalProtect RCE (CVE-2024-3400)

+ Fortinet FortiOS RCE (CVE-2024-21762)

+ CrushFTP RCE (CVE-2024-4040)

+ ScreenConnect RCE (CVE-2024-1709)

+ JetBrains RCE (CVE-2024-27198)

+ older/still working exploits private versions (Bluekeep, Zerologon, SMBGhost, and others)

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from C2. The source codes of the exploits are also given.

Contact with PM.
 
Последнее редактирование:
Пожалуйста, обратите внимание, что пользователь заблокирован
+ Magento RCE (CVE-2024-2961)

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from C2. The source codes of the exploits are also given.

Contact with PM.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
+ unique Ivanti full-chain exploit, three vulnerabilities leveraged in one exploit (CVE-2023-46805, CVE-2024-21893, CVE-2024-21887)

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from C2. The source codes of the exploits are also given.

Contact with PM.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
+ GitLab Password Reset Account Takeover Exploit (CVE-2023-7028)

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from C2. The source codes of the exploits are also given.

Contact with PM.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
после оплаты человек переставл выходить на связь, Проводили сделку 11.09. С 13.09 чел в загасе. На экспе арбитраж
 
Статус
Закрыто для дальнейших ответов.
Верх