• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

exploit

  1. dEEpEst

    Binary Exploit Cheatsheet

    [hide] https://app.box.com/s/uegechcm67uwxa88skd2xhih0yw1xmhl [/Hide[
  2. W

    Exploits Exploit for CVE-2019-0708 [BlueKeep]

    cve_2019_0708_bluekeep_rce.rb  > /usr/share/metasploit-framework/modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb rdp.rb  > /usr/share/metasploit-framework/lib/msf/core/exploit/rdp.rb rdp_scanner.rb  &gt...
  3. dEEpEst

    Android Exploit just watching a Video [CVE-2019-2107]

    CVE-2019-2107 CVE-2019-2107 - looks scary. Still remember Stagefright and PNG bugs vulns .... With CVE-2019-2107 the decoder/codec runs under mediacodec user and with properly "crafted" video (with tiles enabled - ps_pps->i1_tiles_enabled_flag) you can possibly do RCE. The codec affected is...
  4. dEEpEst

    MANYVIDS.COM EXPLOIT - GET ALL VIDEOS FOR FREE 

    MANYVIDS.COM EXPLOIT - GET ALL VIDEOS FOR FREE  :m:This method bypasses ManyVids.com payment processor and you can get literally every video from the site for free.The site is https://www.manyvids.com/ if you don't know what I am talking about. Hidden content Pass: level23hacktools.com
  5. dEEpEst

    PDF Exploit Builder By the AutoLog team

    Download: Hidden content Password: level23hacktools.com
  6. itsMe

    ATSCAN SCANNER v17.0.0 Advanced Search & Mass Exploit Scanner

    Advanced Search / Dork / Mass Exploitation Scanner Description Search engine Google / Bing / Ask / Yandex / Sogou ● Mass Dork Search ● Multiple instant scans. ● Mass Exploitation ● Use proxy. ● Random user agent. ● Random engine. ● Extern commands execution. ● XSS / SQLI / LFI / AFD...
  7. dEEpEst

    Tor Browser Exploit From

    Hidden content
  8. dEEpEst

    [Python] Exploit XSS with an Image

    Hidden content
  9. itsMe

    Exploit Office Builder - Introduces Your Exe into docx and Loader

    The software runs your .exe in a .docx format that can be easily mailed, the file is not detected but "yes" if your .exe file is not encrypted. Functionality: Loader (download and start the exe plugin link, do not use https/ssl) Infects all files inside rar and zip Infects everything .docx...
  10. itsMe

    Wesng - Windows Exploit Suggester

    WES-NG is a tool based on the output of Windows' systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to, including any exploits for these vulnerabilities. Every Windows OS between Windows XP and Windows 10, including their Windows Server counterparts, is supported...
  11. dEEpEst

    Pompem - Exploit and Vulnerability Finder

    Pompem - Exploit and Vulnerability Finder Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases. Developed in Python, has a system of advanced search, that help the work of pentesters and ethical hackers. In the current...
  12. B

    silent url exploit

    i am looking tutorial or where to buy silent url exploit
  13. itsMe

    PhoneSploit v1.2 - Using Open Adb Ports We Can Exploit A Andriod Device

    Using open Adb ports we can exploit an Andriod device. you can find open ports here https://www.shodan.io/search?query=android+debug+bridge+product%3A”Android+Debug+Bridge” To find out how to access a local device --> https://www.youtube.com/watch?v=OlhCAX1qBQo Recent News (New Update...
  14. itsMe

    PhoneSploit - Using Open Adb Ports We Can Exploit A Devive

    Using open Adb ports we can exploit a device you can find open ports here https://www.shodan.io/search?query=android+debug+bridge+product%3A”Android+Debug+Bridge” To find out how to access a local device: Hidden content
  15. F B I

    Exploits Exploit for Shell Upload +Deface

    Hidden content
  16. 1

    Exploits System Down: A systemd-journald Exploit

    This is the systemd-journald exploit produced by Qualys that demonstrates the vulnerabilities as highlighted in CVE-2018-16865 and CVE-2018-16866. View the full article
  17. M

    EXPLOIT 100% FUD

    I need an exploit with 100% FUD please anyone can help?
  18. itsMe

    Darksplitz - Exploit Framework

    Features     Extract mikrotik credential (user.dat)     Password generator     Reverse IP lookup     Mac address sniffer     Online md5 cracker     Mac address lookup     Collecting url from web.archive.org     Web backdoor (Dark Shell)     Winbox exploit (CVE-2018-14847)     ChimeyRed...
  19. R

    WINRAR Exploit Builder | CVE: 2018-20250 | Build malicious RAR file | Free Service

    Since some members on here have started creating "builders" of CVE 2018-20250 and starting to charge money from people who cant use the public CVE themself, I decided to make a quickly website which builds a malicious rar file for you. I did not want to use money on a domain for a free service...
  20. dEEpEst

    WordPress Exploit [Download Site Backup]

    Hidden content
Back
Top