[ Tool ] Leaked Exploit Bot 💥 Auto Scan Shell X3⭐⭐⭐

  • 💌Important Message to All Fellas💌

    💌Important Message to All Fellas 💌

    ⚠️Thank you for being with us over the past year.
    To support our community, we're now offering an "Account Upgrade" for purchase.
    VIP and Legendary members get special direct downloads without needing to like or reply to threads. Upgrade now to enjoy these benefits!
    HERE Our Official Telegram

    ⛔ Spam: If someone try SCAM you or SPAM Message to you let me know we will ban them

    🏆 Download Error or Missing Link: Click on threads and report them to Our admin will re-upload for you.

    ☣️ Infected or Backdoor/RAT: If you find a virus, please report it to us via Telegram or click report in the threads, and we will completely ban them in 100%

    🎯 Our Plan : Make resource downloads on a private host without using another free upload because easy gone

    ❤️ We try our best to make everyone's shared tools clean and fresh in here, so enjoy with our fellas. ❤️

Leaked Exploit Developed by Haxel0rd

66777786.png

CVE-2022-26134 Tools:
Scan for Confluence RCE CVE-2022-26134

This tool scans if a target is vulnerable to CVE-2022-26134.

Tested on: Windows/Linux, Python 2.7 - 3.x
Dependencies: argparse, requests
Note: Invasive checks (non-destructive RCE performed)
Examples:

python confluenceRCE.py -t
Please, Log in or Register to view URLs content!

python confluenceRCE.py -t
Please, Log in or Register to view URLs content!

python confluenceRCE.py -t 127.0.0.1 -p 8090 -c 15 (set timeout)
Exchangy.py Exploit Tool
Purpose:
Quickly gather information on Microsoft Exchange Server versions and patch levels. No authentication required!

Works remotely without logging in
Detects almost all Exchange versions
Bypasses firewall protection and cleansed panels
Tested on Win/Linux, Python 3.7+
Usage examples:
python3 exchangy.py -t mail.someserver.com
python3 exchangy.py -t mail.someserver.com -p 8443
python3 exchangy.py -s (skip online probe)
ShellEX v1.0 - HAFNIUM Vulnerability & Infection Scanner

This tool scans Exchange Servers for CVE-2021-26855 & web shell infections. Designed for mass scanning of targets.

Features:
Detects over 90 shell variants (First wave after Microsoft report)
Multithreaded for mass scanning
Works remotely from a "BlackBox" point of view
Minimal false positives
Smart scanning, saving requests to offline hosts
Examples:

python3 shellEX.py -h (Help page)
python3 shellEX.py -t mail.company.com (Single target)
python3 shellEX.py -i targets.txt -o results.txt (List of targets)
Options & Tweaks:
-h Help page
-x Number of threads
-c Scanning timeout
-a Add custom shells for detection
-t Target URL
-i Input file for list of targets
-o Output file for results
-v Verbose mode
This should be easier to read, more concise, and with a clearer structure. Let me know if this works better for you!

drcrypter or drcrypter_ru

 

Forum statistics

Threads
1,833
Messages
35,548
Members
9,203
Latest member
JeiJei
Member time online
745d 20h 10m
Reputation(s)
26