What's new
Runion

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

[SELL] Exploits (0-day & 1-day. RCE. LPE. VPN RCEs. IoT Exploits)

Actual.

Latest Windows and Linux LPEs (full list on PM) + ProxyNotShell (CVE-2022-41082) RCE + CVE-2022-40684 Fortinet RCE + Atlassian Bitbucket exploit (CVE-2022-36804) + latest VMware RCEs (CVE-2021-39144, CVE-2022-31675, CVE-2022-22960) + latest Oracle RCEs (CVE-2022-21497, CVE-2021-35587) + Veeam RCE (CVE-2022-26501) + Apache RCEs (CVE-2022-24706, CVE-2022-24112).

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from Cobalt Strike. The source codes of the exploits are also given.

Contact with PM.
 
Actual.

Latest Windows and Linux LPEs (full list on PM) + ProxyNotShell (CVE-2022-41082) RCE + CVE-2022-40684 Fortinet RCE + Atlassian Bitbucket exploit (CVE-2022-36804) + latest VMware RCEs (CVE-2021-39144, CVE-2022-31675, CVE-2022-22960) + latest Oracle RCEs (CVE-2022-21497, CVE-2021-35587) + Veeam RCE (CVE-2022-26501) + Apache RCEs (CVE-2022-24706, CVE-2022-24112).

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from Cobalt Strike. The source codes of the exploits are also given.

Contact with PM.
 
johndoe7, если вы не хотите видеть флуд в своей теме, выкладывайте нормальное подробное техническое описание продаваемых эксплойтов.

johndoe7, if you don't want to see flood in your thread, add detailed technical description of the exploits you sell.
 
People receive exactly what is explained in the thread. There are the names of the exploits and the CVEs. The exploits are private - private implementations, not public code - I cannot publish the source code here but it is available to anyone who buys.

Private alternative implementations of 1-day exploits are very valuable. Any normal person who works with these things can remember how people were seeking different implementations of the Bluekeep exploit for example - and there were at least two popular alternatives - from Metasploit and from Immunity CANVAS - and people were searching hard for the CANVAS alternative! Private implementations of 1-day exploits are valuable.

Also the exploits come integrated in a tool with GUI and other options that make it convenient to work - for example the ability to pass easily sessions to and from Cobalt Strike, and others.
 
Actual.

Latest Windows and Linux LPEs (full list on PM) + ProxyNotShell (CVE-2022-41082) RCE + CVE-2022-40684 Fortinet RCE + Atlassian Bitbucket exploit (CVE-2022-36804) + latest VMware RCEs (CVE-2021-39144, CVE-2022-31675, CVE-2022-22960) + latest Oracle RCEs (CVE-2022-21497, CVE-2021-35587) + Veeam RCE (CVE-2022-26501) + Apache RCEs (CVE-2022-24706, CVE-2022-24112).

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from Cobalt Strike. The source codes of the exploits are also given.

Contact with PM.
 
Actual.

Latest Windows and Linux LPEs (full list on PM) + ProxyNotShell (CVE-2022-41082) RCE + CVE-2022-40684 Fortinet RCE + Atlassian Bitbucket exploit (CVE-2022-36804) + latest VMware RCEs (CVE-2021-39144, CVE-2022-31675, CVE-2022-22960) + latest Oracle RCEs (CVE-2022-21497, CVE-2021-35587) + Veeam RCE (CVE-2022-26501) + Apache RCEs (CVE-2022-24706, CVE-2022-24112).

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from Cobalt Strike. The source codes of the exploits are also given.

Contact with PM.
 
SHOUNEN_PROTAGONIST сказал(а):
I saw one of your exploits, in this website "0day.today"
Нажмите, чтобы раскрыть...
Some of the exploits in this thread are quite famous! Well, yes - they are mentioned in many places! Why the fuck is that spam?

When you buy from me you can use the guarantor. I already have a deal on this forum for these exploits with the automatic guarantor.
 
Actual.

Latest Windows and Linux LPEs (full list on PM) + ProxyNotShell (CVE-2022-41082) RCE + CVE-2022-40684 Fortinet RCE + Atlassian Bitbucket exploit (CVE-2022-36804) + latest VMware RCEs (CVE-2021-39144, CVE-2022-31675, CVE-2022-22960) + latest Oracle RCEs (CVE-2022-21497, CVE-2021-35587) + Veeam RCE (CVE-2022-26501) + Apache RCEs (CVE-2022-24706, CVE-2022-24112).

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from Cobalt Strike. The source codes of the exploits are also given.

Contact with PM.
 
Latest exploits: Fortinet RCE, ProxyNotShell, VMware, Apache, Oracle RCEs. Plus all older famous exploits: PrintNightmare (LPE + RCE), Zerologon, Spring4Shell. Updated versions of Bluekeep and Log4Shell exploits. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from Cobalt Strike.

Contact with PM.
 
Latest exploits: Fortinet RCE, ProxyNotShell, VMware, Apache, Oracle RCEs. Plus all older famous exploits: PrintNightmare (LPE + RCE), Zerologon, Spring4Shell. Updated versions of Bluekeep and Log4Shell exploits. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from Cobalt Strike.

Contact with PM.
 
Actual.

Latest Windows and Linux LPEs (full list on PM) + ProxyNotShell RCE (CVE-2022-41082) + Fortinet RCE (CVE-2022-40684) + Atlassian Bitbucket exploit (CVE-2022-36804) + latest VMware RCEs (CVE-2022-31711, CVE-2022-31675, CVE-2022-22960) + latest Oracle RCE (CVE-2022-21497) + Veeam RCE (CVE-2022-26501) + Apache RCEs (CVE-2022-24706, CVE-2022-24112).

+ new Veeam RCE (CVE-2023-2753) + CentOS exploit (CVE-2022-44877) + updated Go Anywhere MFT RCE (CVE-2023-0669) + latest Windows LPEs from 2023 (list on PM).

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from Cobalt Strike. The source codes of the exploits are also given.

Contact with PM.
 
+ PaperCut RCE (CVE-2023-27350)

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from Cobalt Strike. The source codes of the exploits are also given.

Contact with PM.
 
+ new Oracle Weblogic RCE (CVE-2023-21839)

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from Cobalt Strike. The source codes of the exploits are also given.

Contact with PM.
 
Actual.

Latest Windows and Linux LPEs (full list on PM) + ProxyNotShell RCE (CVE-2022-41082) + Fortinet RCE (CVE-2022-40684) + Atlassian Bitbucket exploit (CVE-2022-36804) + latest VMware RCEs (CVE-2022-31711, CVE-2022-31675, CVE-2022-22960) + Oracle RCE (CVE-2022-21497) + Veeam RCE (CVE-2022-26501) + Apache RCEs (CVE-2022-24706, CVE-2022-24112).

+ new Veeam RCE (CVE-2023-2753) + CentOS exploit (CVE-2022-44877) + updated Go Anywhere MFT RCE (CVE-2023-0669) + PaperCut RCE (CVE-2023-27350) + new Oracle Weblogic RCE (CVE-2023-21839) + latest Windows LPEs from 2023 (list on PM).

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from Cobalt Strike. The source codes of the exploits are also given.

Contact with PM.
 
+ HP Hardware Diagnostics EtdSupp LPE (CVE-2023-32673) - this exploit is currently not available anywhere else.

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from Cobalt Strike. The source codes of the exploits are also given.

Contact with PM.
 
+ CVE-2023-32233

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from Cobalt Strike. The source codes of the exploits are also given.

Contact with PM.
 
Actual.

ProxyNotShell RCE (CVE-2022-41082) + Fortinet RCE (CVE-2022-40684) + Atlassian Bitbucket exploit (CVE-2022-36804) + latest VMware RCEs (CVE-2022-31711, CVE-2022-31675, CVE-2022-22960) + Oracle RCE (CVE-2022-21497) + Veeam RCE (CVE-2022-26501) + Apache RCEs (CVE-2022-24706, CVE-2022-24112).

+ new Veeam RCE (CVE-2023-2753) + CentOS exploit (CVE-2022-44877) + updated Go Anywhere MFT RCE (CVE-2023-0669)
+ PaperCut RCE (CVE-2023-27350) + new Oracle Weblogic RCE (CVE-2023-21839) + latest Windows LPEs from 2023 (list on PM) + latest Linux LPEs from 2023 (CVE-2023-32233, CVE-2023-0386).

All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from Cobalt Strike. The source codes of the exploits are also given.

Contact with PM.
 
Top