I saw a few of these "rce exploits" and they majority are just a bunch of people who made a .bat file that just says random shit like. The best one I saw was one that claimed to hack accs and had "bypassing mobile auth part *"
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Of note, in the video it says he's using lsass.exe to escalate to kernel space. lsass.exe is protected by Microsoft's hypervisor memes. That would make it a chain, and that's the stuff (not the Source exploit) you sell to
@Zerodium . Funny vid though.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
