Actual.
ProxyNotShell RCE (CVE-2022-41082) + Fortinet RCE (CVE-2022-40684) + Atlassian Bitbucket exploit (CVE-2022-36804) + latest VMware RCEs (CVE-2022-31711, CVE-2022-31675, CVE-2022-22960) + Oracle RCE (CVE-2022-21497) + Veeam RCE (CVE-2022-26501) + Apache RCEs (CVE-2022-24706, CVE-2022-24112).
+ new Veeam RCE (CVE-2023-2753) + CentOS exploit (CVE-2022-44877) + updated Go Anywhere MFT RCE (CVE-2023-0669)
+ PaperCut RCE (CVE-2023-27350) + new Oracle Weblogic RCE (CVE-2023-21839) + latest Windows LPEs from 2023 (list on PM) + latest Linux LPEs from 2023 (CVE-2023-32233, CVE-2023-0386).
All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from Cobalt Strike. The source codes of the exploits are also given.
Contact with PM.
ProxyNotShell RCE (CVE-2022-41082) + Fortinet RCE (CVE-2022-40684) + Atlassian Bitbucket exploit (CVE-2022-36804) + latest VMware RCEs (CVE-2022-31711, CVE-2022-31675, CVE-2022-22960) + Oracle RCE (CVE-2022-21497) + Veeam RCE (CVE-2022-26501) + Apache RCEs (CVE-2022-24706, CVE-2022-24112).
+ new Veeam RCE (CVE-2023-2753) + CentOS exploit (CVE-2022-44877) + updated Go Anywhere MFT RCE (CVE-2023-0669)
+ PaperCut RCE (CVE-2023-27350) + new Oracle Weblogic RCE (CVE-2023-21839) + latest Windows LPEs from 2023 (list on PM) + latest Linux LPEs from 2023 (CVE-2023-32233, CVE-2023-0386).
All my exploits are private implementations. Come with very easy-to-navigate GUI and also an ability of passing sessions to and from Cobalt Strike. The source codes of the exploits are also given.
Contact with PM.