[ authorization ] [ registration ] [ Wiederherstellen ]
Kontaktiere uns:
You can contact us by:
0day.today 1337day Inj3ct0r Exploits Market and 0day Exploits Database
Inj3ct0r ist die ultimative Datenbank voller Exploits und Schwachstellen und eine fantastische Ressource für Schwachstellenforscher und Sicherheitsspezialisten.
Unser Ziel ist es, Exploits von Einsendungen und diversen Mailinglisten zu sammeln und sie in einer einfach zu durchsuchenden Datenbank zusammenzufassen.
Diese Seite wurde ausschließlich für Bildungszwecke geschrieben. Benutzung auf eigene Verantwortung. Der Autor ist nicht für eventuelle Schäden verantwortlich. // r0073r

 How to buy exploit? Two ways to buy required exploit. Currency, that we accept.

  1. Anonymous buying of exploits is the way to buy exploit without registration. You buy it directly and anonymous and get exploit on mail.
  1. Another way to buy exploits is to became 0day.today 1337day user, get 0day.today 1337day Gold and buy required exploit in our database.
We accept currencies: [contact admin to find more]
                           

                   

  What is 0day.today 1337day Gold? How to buy 0day.today 1337day Gold? How to earn 0day.today 1337day Gold?

  • 0day.today 1337day Gold is the currency of 0day.today 1337day project. It used for paying for the services, buying exploits, earning money, etc.
  • You can buy Gold: exchange money to Gold
  • You can earn Gold: selling exploits, helping with cracking hashes, etc.
We accept currencies: [contact admin to find more]
                       

                   

  How to sell exploits? Earning 0day.today 1337day Gold.

  1. To sell exploits on 0day.today 1337day exploits database you need to be registered user. You can login or register
  2. You need to found new unique vulnerability or 0day exploit. Create description, make approve video, screenshots, other useful information.
  3. Publish it on our database site, wait for cheking it by 0day.today 1337day Administration. Then wait for customers and earn money!
  4. You also can make it more popular with Highlight service.
  5. After you earn the 0day.today 1337day Gold you can get it out from the system to payment ystem, that you use.
Anytime support for users: [contact admin]
Suche:              Extended search

0day.today 1337day Private exploits and 0day exploits Market


Zero-day exploits target zero-day vulnerabilities. Zero-day vulnerabilities are those for which no official patch has been released by the vendor. This means that no days [zero days] have elapsed between the time the vulnerability was discovered and the time an official patch was made available. Therefore, the administrators have had zero days to fix the flaw. It ceases to be a zero day once a fix is available.
Private category sells private Exploits and Vulnerabilities. Users can buy exploits using Gold [registered users] or using incognito mode [unregistered users], specify only mail to get material.

[ highlight ]

Highlight category


In this category published paid 0day exploits / vulnerabilities worthy of your attention. You can buy, sell and highlighted the material in red for sale. A zero-day (or 0day) attack or threat is an attack that exploits a previously unknown vulnerability in a computer application, one that developers have not had time to address and patch. It is called a “zero-day” because the programmer has had zero days to fix the flaw (in other words, a patch is not available). Once a patch is available, it is no longer a “zero-day exploit”. It is common for individuals or companies who discover zero-day attacks to sell them to government agencies for use in cyberwarfare.

Malware writers are able to exploit zero-day vulnerabilities through several different attack vectors. Web browsers are a particular target because of their widespread distribution and usage. Attackers can also send e-mail attachments, which exploit vulnerabilities in the application opening the attachment. Exploits that take advantage of common file types are listed in databases like US-CERT. Malware can be engineered to take advantage of these file type exploits to compromise attacked systems or steal confidential data such as banking passwords and personal identity information

An attack that takes place immediately after a security vulnerability is announced. If a user discovers a vulnerability, it might wind up on one or two blogs, and the news travels fast. If a software vendor finds it, the tendency is to keep it under wraps until it has a patch to fix it. However, in many cases, vendors have to announce the flaw because users may be able to avoid the problem by steering clear of a Web site or being sure to not open a certain e-mail attachment
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR

Twitter reset account Private Method 0day Exploit

Positiv:
0
Negativ:
0
Kommentare:
16
36 543
Security Risk Critical
R
D
Download
Verified by
 
0.281
Open this exploit for 0.281 BTC
Open this exploit for 2 300 GOLD
0day Today Team
Exploits:
271
BusinessLevel:
26
Warnungen:
5

Instagram bypass Access Account Private Method Exploit

Positiv:
0
Negativ:
0
Kommentare:
59
47 991
Security Risk Critical
R
D
Download
Verified by
 
0.244
Open this exploit for 0.244 BTC
Open this exploit for 2 000 GOLD
smokzz
Exploits:
1
BusinessLevel:
2
Warnungen:
2

SMF 2.1 Beta 2 Remote Code Execution 0day Exploit

Positiv:
0
Negativ:
0
Kommentare:
2
10 300
Security Risk Critical
R
D
Download
Verified by
 
0.428
Open this exploit for 0.428 BTC
Open this exploit for 3 500 GOLD
Protocol.8
Exploits:
2
BusinessLevel:
2
Warnungen:
2

SMF 2.0.x Remote Code Execution 0day Exploit

Positiv:
0
Negativ:
0
Kommentare:
18
26 250
Security Risk Critical
R
D
Download
Verified by
 
0.611
Open this exploit for 0.611 BTC
Open this exploit for 5 000 GOLD
Protocol.8
Exploits:
2
BusinessLevel:
2
Warnungen:
2

Elastix PBX 2.x.x Remote Command Execution 0day Exploit

Positiv:
3
Negativ:
1
Kommentare:
6
23 835
Security Risk Critical
R
D
Download
Verified by
 
0.367
Open this exploit for 0.367 BTC
Open this exploit for 3 000 GOLD
RusH
Exploits:
33
BusinessLevel:
9
Warnungen:
0

[ remote exploits ]

Remote exploits and vulnerabilities category


A “remote exploit” works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR

Instagram info disclosure (email + phone) 0day Exploit

Positiv:
0
Negativ:
0
Kommentare:
0
4 159
Security Risk High
R
D
Download
Verified by
 
0.171
Open this exploit for 0.171 BTC
Open this exploit for 1 400 GOLD
HXO1
Exploits:
1
BusinessLevel:
0
Warnungen:
0
3 698
Security Risk Critical
R
D
Download
Verified by
 
0.55
Open this exploit for 0.55 BTC
Open this exploit for 4 500 GOLD
0day Today Team
Exploits:
271
BusinessLevel:
26
Warnungen:
5

GovRAT 2.0 – FUD unknown RAT with special functions

Positiv:
2
Negativ:
0
Kommentare:
5
1 970
Security Risk Critical
R
D
Download
Not verified yet
 
0.367
Open this exploit for 0.367 BTC
Open this exploit for 3 000 GOLD
spdrman
Exploits:
3
BusinessLevel:
3
Warnungen:
0
8 610
Security Risk Critical
R
D
Download
Verified by
 
0.733
Open this exploit for 0.733 BTC
Open this exploit for 6 000 GOLD
0day Today Team
Exploits:
271
BusinessLevel:
26
Warnungen:
5

Google Chrome RCE + Sandbox Escape 0day Exploit

Positiv:
0
Negativ:
0
Kommentare:
7
11 493
Security Risk Critical
R
D
Download
Verified by
 
0.636
Open this exploit for 0.636 BTC
Open this exploit for 5 200 GOLD
0day Today Team
Exploits:
271
BusinessLevel:
26
Warnungen:
5

Vanilla Forums 2.0.18.7 Remote Code Execution Exploit

Positiv:
0
Negativ:
0
Kommentare:
3
4 692
Security Risk Critical
R
D
Download
C
CVE-2013-3527
Verified by
 
0.012
Open this exploit for 0.012 BTC
Open this exploit for 99 GOLD
seven.fire.seven
Exploits:
1
BusinessLevel:
0
Warnungen:
2
5 147
Security Risk Critical
R
D
Download
Verified by
 
0.196
Open this exploit for 0.196 BTC
Open this exploit for 1 600 GOLD
0day Today Team
Exploits:
271
BusinessLevel:
26
Warnungen:
5
3 621
Security Risk Critical
R
D
Download
C
CVE-2017-2994
Verified by
 
0.183
Open this exploit for 0.183 BTC
Open this exploit for 1 500 GOLD
0day Today Team
Exploits:
271
BusinessLevel:
26
Warnungen:
5

[ local exploits ]

Local exploits and vulnerabilities category


A “local exploit” requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR

Apple iOS 11.1.1 kernel DoS Exploit

Positiv:
0
Negativ:
0
Kommentare:
2
4 098
Security Risk High
R
D
Download
Verified by
 
0.611
Open this exploit for 0.611 BTC
Open this exploit for 5 000 GOLD
muxbear
Exploits:
1
BusinessLevel:
0
Warnungen:
0
11 936
Security Risk Critical
R
D
Download
Verified by
 
0.465
Open this exploit for 0.465 BTC
Open this exploit for 3 800 GOLD
0day Today Team
Exploits:
271
BusinessLevel:
26
Warnungen:
5
3 804
Security Risk Critical
R
D
Download
Verified by
 
0.367
Open this exploit for 0.367 BTC
Open this exploit for 3 000 GOLD
macos0day
Exploits:
1
BusinessLevel:
1
Warnungen:
0

PowerPoint 2003/2007/2010 Silent Builder Exploit

Positiv:
0
Negativ:
0
Kommentare:
0
9 119
Security Risk Critical
R
D
Download
Verified by
 
0.367
Open this exploit for 0.367 BTC
Open this exploit for 3 000 GOLD
0day Today Team
Exploits:
271
BusinessLevel:
26
Warnungen:
5

OS X 10.10.2-10.10.4 Privilege Escalation Exploit 0day

Positiv:
0
Negativ:
0
Kommentare:
5
2 924
Security Risk Critical
R
D
Download
Verified by
 
0.122
Open this exploit for 0.122 BTC
Open this exploit for 1 000 GOLD
jiehu
Exploits:
1
BusinessLevel:
1
Warnungen:
0

OpenSSH rootkit backdoor tool with ssh sniffer

Positiv:
1
Negativ:
0
Kommentare:
2
20 051
Security Risk Critical
R
D
Download
Verified by
 
0.011
Open this exploit for 0.011 BTC
Open this exploit for 90 GOLD
florinu
Exploits:
5
BusinessLevel:
3
Warnungen:
0
14 219
Security Risk Critical
R
D
Download
Verified by
 
0.183
Open this exploit for 0.183 BTC
Open this exploit for 1 500 GOLD
crash.poc
Exploits:
5
BusinessLevel:
3
Warnungen:
0
12 241
Security Risk Critical
R
D
Download
C
CVE-2010-3333
Verified by
 
0.004
Open this exploit for 0.004 BTC
Open this exploit for 30 GOLD
!m0Nk3y_
Exploits:
1
BusinessLevel:
3
Warnungen:
0

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
2 278
Security Risk High
R
D
Download
Verified by
 
0.147
Open this exploit for 0.147 BTC
Open this exploit for 1 200 GOLD
ogcrypto
Exploits:
1
BusinessLevel:
0
Warnungen:
0

INTERMEDIA CONSEIL – Remote Code Execution Exploit

Positiv:
0
Negativ:
0
Kommentare:
0
2 363
Security Risk Critical
R
D
Download
Verified by
 
0.018
Open this exploit for 0.018 BTC
Open this exploit for 150 GOLD
mr.oz1337
Exploits:
1
BusinessLevel:
0
Warnungen:
0

Paypal bypass email verify logins Vulnerability

Positiv:
0
Negativ:
0
Kommentare:
4
9 654
Security Risk Critical
R
D
Download
Verified by
 
0.306
Open this exploit for 0.306 BTC
Open this exploit for 2 500 GOLD
lulz0day
Exploits:
2
BusinessLevel:
1
Warnungen:
0
8 743
Security Risk High
R
D
Download
Verified by
 
0.122
Open this exploit for 0.122 BTC
Open this exploit for 1 000 GOLD
shladwani
Exploits:
1
BusinessLevel:
1
Warnungen:
1
6 346
Security Risk High
R
D
Download
Verified by
 
0.183
Open this exploit for 0.183 BTC
Open this exploit for 1 500 GOLD
nexcorp
Exploits:
1
BusinessLevel:
1
Warnungen:
0

Wix Remote Email PoC 0day

Positiv:
0
Negativ:
0
Kommentare:
4
4 869
Security Risk High
R
D
Download
Verified by
 
0.244
Open this exploit for 0.244 BTC
Open this exploit for 2 000 GOLD
acidobinario
Exploits:
1
BusinessLevel:
1
Warnungen:
0
4 626
Security Risk Low
R
D
Download
Verified by
 
0.012
Open this exploit for 0.012 BTC
Open this exploit for 100 GOLD
MrUke
Exploits:
1
BusinessLevel:
1
Warnungen:
0

SMF 2.1 Beta 2 Remote Code Execution 0day Exploit

Positiv:
0
Negativ:
0
Kommentare:
2
10 300
Security Risk Critical
R
D
Download
Verified by
 
0.428
Open this exploit for 0.428 BTC
Open this exploit for 3 500 GOLD
Protocol.8
Exploits:
2
BusinessLevel:
2
Warnungen:
2

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 497
Security Risk High
R
D
Download
C
CVE-2016-6304
Verified by
 
0.009
Open this exploit for 0.009 BTC
Open this exploit for 70 GOLD
teneciousD
Exploits:
1
BusinessLevel:
1
Warnungen:
0

Facebook official android apps crash exploit

Positiv:
1
Negativ:
0
Kommentare:
0
9 518
Security Risk High
R
D
Download
Verified by
 
0.122
Open this exploit for 0.122 BTC
Open this exploit for 1 000 GOLD
wormterm
Exploits:
1
BusinessLevel:
2
Warnungen:
0

Word 2003 SP2 .doc fork bomb on WinXP SP3

Positiv:
0
Negativ:
0
Kommentare:
0
11 611
Security Risk High
R
D
Download
Not verified yet
 
0.018
Open this exploit for 0.018 BTC
Open this exploit for 150 GOLD
sult4n
Exploits:
1
BusinessLevel:
3
Warnungen:
0

Mozilla FireFox 24/25 All OS Freeze & Crash Exploit

Positiv:
2
Negativ:
0
Kommentare:
3
11 977
Security Risk High
R
D
Download
Verified by
 
0.004
Open this exploit for 0.004 BTC
Open this exploit for 30 GOLD
The Black Devils
Exploits:
136
BusinessLevel:
13
Warnungen:
0

IOS 7.0.3 freeze & crash exploit

Positiv:
0
Negativ:
0
Kommentare:
1
13 944
Security Risk High
R
D
Download
Verified by
 
0.005
Open this exploit for 0.005 BTC
Open this exploit for 40 GOLD
XoDer
Exploits:
4
BusinessLevel:
3
Warnungen:
0

LogMeIn Hamachi <= 2.1.0.362 Remote DOS

Positiv:
1
Negativ:
0
Kommentare:
0
16 257
Security Risk High
R
D
Download
Verified by
 
0.002
Open this exploit for 0.002 BTC
Open this exploit for 20 GOLD
SnakingMax
Exploits:
6
BusinessLevel:
4
Warnungen:
0
11 748
Security Risk Medium
R
D
Download
Verified by
 
0.009
Open this exploit for 0.009 BTC
Open this exploit for 70 GOLD
Xianur0
Exploits:
11
BusinessLevel:
6
Warnungen:
0
19 788
Security Risk High
R
D
Download
Verified by
 
0.061
Open this exploit for 0.061 BTC
Open this exploit for 500 GOLD
Xianur0
Exploits:
11
BusinessLevel:
6
Warnungen:
0