CVE-2019-0708

Critical Remote Code Execution Vulnerability

img

RDP Vulnerability

This vulnerability utilizes a specially-crafted packet to execute arbitrary code on the victim system and does not require successful authentication. It requires only that the system be vulnerable and reachable via RDP from the attack platform.

read more
img

Windows Versions Infected

  • Windows XP (all)
  • Windows 2003 (all)
  • Windows 7 SP 1 (32 and 64 bit)
  • Windows Server 2008
  • Windows Server 2008 R2
read more
img

How to use

Very easy! Click and Run.
This tool help you exploit any target require Open RDP port (3389).
You can load a list IP address and Port for bulk exploit target!
You can watch video POC here!

Watch Video

Screenshots

Screenshot latest version (v2.6 - 25 June 2019)

Version 2.6

CVE-2019-0708 Exploit

CVE-2019-0708 Code Exploit

Price

Price for download tool

Software

$20

  • Portable File (.EXE)
  • Tech Support / Email
  • Lifetime
  • Unlimited Used
  • Not For Resale

Souce Code (BEST)

$50

  • Source Code (C# / Python)
  • Tech Support / Chat Online
  • Lifetime
  • Unlimited Used
  • Can Resale

Update History

All Change History

  • 01 Sept 2019: Update Version v3.2
  • 25 June 2019: Update Version v2.6
  • 27 May 2019: Update Version v1.8
  • 20 May 2019: Update Version v1.5
  • 18 May 2019: Update Version v1.3
  • 17 May 2019: Fix bug crash dump error on Windows 7. Release version v1.1

  • 16 May 2019: Release Tool. Version v1.0

Contact

Send to us any questions or need share information about this vulnerability.

Your message has been sent. Thank you!

Comments



  • 2019-10-07 @Lon

    This was very helpful. Thank you !

  • 2019-10-05 @Lizbeth Luter

    thanks for this video. Extremely helpful.

  • 2019-10-03 @Young

    wow very insightful tool.

  • 2019-10-02 @Vernon

    Thank You, Thanks a lot..

  • 2019-10-02 @Mason

    Hi! Can I have the source code example? Thx a lot

  • 2019-09-30 @Eura Plattner

    Thanks for this great tool.

  • 2019-09-29 @Jackson

    Thank you - this worked immediately.

  • 2019-09-29 @Reggie

    Amazing, thanks so much!

  • 2019-09-27 @Wes

    Good tool. I like the security-focused videos, please consider doing more like this. Thanks!

  • 2019-09-26 @Gene

    this tool helped me a lot

  • 2019-09-23 @Gail

    The tool is looking amazing there!!!!!!!! Good work sir!

  • 2019-09-23 @Felipe

    I get good knowledge from this tool so i need additional video related album.

  • 2019-09-23 @Parker

    thank you so much :))))

  • 2019-09-23 @Connie

    my friend really helpfull tool. congrats 🙌

  • 2019-09-22 @Magnolia Hursh

    Can you please explain the payload generation in further depth I am not quite sure on how to generate a payload to hex packet

  • 2019-09-22 @Damian

    Great tool. Thanks for uploading. Simple to follow easy to replicate. Now to add some sort of search functionality in. =))

  • 2019-09-21 @Jacqualine Fresquez

    Good tool mate

  • 2019-09-20 @Shirley

    Thanks for the stuffs... more of this please.

  • 2019-09-20 @Jacqualine Fresquez

    You nailed it! I got it successfully. Thanks for this brilliant tips.

  • 2019-09-18 @Claudio

    Just what I was looking for. Thanks.

  • 2019-09-15 @Felipe

    Excellent explanation

  • 2019-09-14 @Britt

    what is the next step sir?

  • 2019-09-14 @Micheal

    ya yi kyau, wonderful video

  • 2019-09-13 @Joaquin

    Thank you bro.

  • 2019-09-13 @Gus

    omg this is so well done!

  • 2019-09-13 @Gerardo

    Thank you for this amazing tips

  • 2019-09-12 @Noble

    Thank you so much for this tool. Something so simple yet not. It was very helpful

  • 2019-09-12 @Brandon

    Thank you for the tool.

  • 2019-09-12 @Connie

    Great- i simply loved watching!

  • 2019-09-11 @Travis

    hello, nice tool.

  • 2019-09-11 @Ezequiel

    Thanks for this help full tool.

  • 2019-09-11 @Jerry

    Thank you so much for your incredible content!

  • 2019-09-10 @Werner

    Thanks for this help tool.Thank u so much. :)

  • 2019-09-10 @Lorenzo

    Thank you a lot :-) (^_^)

  • 2019-09-09 @Mohammad

    Hi sir great tool.... good morning

  • 2019-09-08 @Shayne

    Awesome tool. Thanks, and please keep them coming! 🙂

  • 2019-09-08 @Edgar

    thanks for sharing my friend,its a great help

  • 2019-09-07 @Trent

    i cant believe it worked on my windows server 2012 too. thanks so much

  • 2019-09-07 @Lorita Shim

    also loved the tool.

  • 2019-09-06 @Mauricio

    Very Clean code. But as a fresher myself, I need explanation. Thank you.

  • 2019-09-05 @Emilio

    Thanks for this help tool.Thank u so much

  • 2019-09-05 @Felipe

    Correction to my last post - it worked!

  • 2019-09-05 @Manual

    Very Helpful. Linktree was a total non-starter until I saw this. Thanks.

  • 2019-09-04 @Gustavo

    thanks man it works ^^ i hope u notice this comment ^^

  • 2019-09-03 @Jose

    Thank you very much for your effort in making this tool, it has been educational and helped out a hobbyist!

  • 2019-09-03 @Blair Zaragosa

    Perfect. Thank you.

  • 2019-09-02 @Dino Petters

    Thank you so much sir

  • 2019-09-02 @Leo

    Thank you verrrry much, Kind sir!

  • 2019-08-30 @Gail

    Great tool thank you so much. Easy to understand!!

  • 2019-08-30 @Renaldo

    Great tutorial thanks alot bro!

  • 2019-08-29 @Lyman

    Thanks for this help tool.Thank u so much. :)

  • 2019-08-28 @Jarvis

    extremely helpful!

  • 2019-08-22 @Carroll

    Like the tool and the concept.

  • 2019-08-21 @Rudolph

    Very helpful! thanks.

  • 2019-08-21 @Jackson

    Thank you! That helped a lot. Well done.

  • 2019-08-20 @Fredricka Amante

    Nice tool i like your job.

  • 2019-08-18 @Roberto

    I have a question. Please check your email.

  • 2019-08-18 @Lon

    Thank you very much! Really help full tool :D

  • 2019-08-15 @Hai

    really great

  • 2019-08-12 @Noble

    I just want to say: THANK YOU!! You literally saved my life :)

  • 2019-08-12 @Phil

    cant wait to place my order, everything they say looks wonderful.

  • 2019-08-10 @Abel

    An interesting project, thank you author for information

  • 2019-08-10 @Nick

    Very good tool. Answered a lot of my questions. I will watch it again! Thank You!

  • 2019-08-08 @Edith Underwood

    online pentest tools sucks you need credits to run exploits hopefully they will change that in the future

  • 2019-08-07 @Javier Garcia

    Can i get link for this tool set please

  • 2019-08-07 @Samuel Becker

    remember always update tools

  • 2019-08-05 @Shelly Salazar

    I recommend it

  • 2019-08-05 @Willie Newton

    very nice thanks

  • 2019-08-04 @Chad Rivera

    defender and firewall status?

  • 2019-08-03 @Eunice Bates

    Bro Can u we use any RAt File With That Exploit ???

  • 2019-08-03 @Ann Gross

    Which system are you using bro ?

  • 2019-08-03 @Nelson Mcgee

    nice work

  • 2019-08-01 @Verna Torres

    GOod tool, give me your skype, i need more option. Can you add?

  • 2019-07-30 @Dwayne Schultz

    Thanks for tool man, I just need an exploiter! :)

  • 2019-07-30 @Jesus Bailey

    Thanks I always wanted to be a hacker

  • 2019-07-29 @Isabel White

    thx now im a full pledge hacker

  • 2019-07-28 @Tyler Mason

    Fast and reliable service. Definitely, recommend!

  • 2019-07-27 @Franklin Perez

    Nice tool

  • 2019-07-26 @KavenYugi

    thanks, i got it. but why u not add check vul function before exploit?

  • 2019-07-24 @jokerkid

    Hello Sir Send You Email Please Read It

  • 2019-07-23 @hello

    hello

  • 2019-07-23 @Crysha

    It was quick and easy. I love using this tool.

  • 2019-07-22 @no one

    it's working ...

  • 2019-07-22 @Keepvid

    Thanks your tool, its greats....

  • 2019-07-20 @JoyCool

    Goood tool. Its working.

  • 2019-07-19 @linlin

    good tool <3

  • 2019-07-18 @Encore

    Hi bro. 1-What source code language? 2-what time to send poc after the order ?Thanks

  • 2019-07-17 @RaiMD

    Hello sir, hope you are fine. sir i am a student. i dont have bitcoin or dollar. in my country bitcoin is illegal. sir, please give me this tool. thanks you.

  • 2019-07-16 @Wolfieldam

    This helped me soooo much. Thanks your tool.

  • 2019-07-16 @ScorpionWoW

    Ow Thats Amazing Program Nice Nice !

  • 2019-07-16 @shini

    how long i receive email after paid ?

  • 2019-07-15 @Tombleon

    I loved the video man, Nice keep it up.

  • 2019-07-14 @PoshyNephew

    hi, python version has problem, it show: “ImportError: No module named “network”.” can you fix it?

  • 2019-07-14 @@lego

    thats just wonderfull

  • 2019-07-14 @@lego

    thats just wonderfull

  • 2019-07-11 @Repolata

    Thanks, its working with win 2k8.

  • 2019-07-09 @Latestence

    are you accept paypal? i really need tool. pls

  • 2019-07-09 @Yi Long

    Sir-Im-a-college-student-of-BUPT-in-China-Im-doing-a-research-on-RDP-and-I-just-saw-your-PoC-for-CVE-2019-0708-on-YouTube-Your-work-is-very-remarkable-and-important-for-my-study-So-I-wonder-if-you-could-help-me-I-would-appreciate-it-if-you-provide-a-download-link-about-your-code-I-wont-spread-it-or-use-it-for-commercial-purpose-Thank-you-and-Best-wishes

  • 2019-07-07 @Jambennet

    Good job, its working. Keep your job.

  • 2019-07-06 @Heraldvete

    hi pls show the corrent vers of yr tool on this home page thxs!

  • 2019-07-05 @GrandKnight

    Great tool, helped me analyze my server and shut down RDP on all server which don

  • 2019-07-03 @Goreamed

    Thanks for the tool. I think it

  • 2019-06-30 @Gantsto

    is portable or is an installer yr tool?is useful for a desktop pc with win 10 home 64bit creators update vers 1703? thxs! cheers!

  • 2019-06-29 @Freener

    avira stop yt tool ..says it is a troyan viruso dopper.why..??

  • 2019-06-26 @Elementum

    The tool is very great, it help me monitor the server machine has not updated this vulnerability. However, the tool has a weakness that is, if i want to exploit again, then i must to exit the program and then run exe again. So inconvenient! Thanks!

  • 2019-06-25 @Dreamyllyb

    Wonderful tool. Runs and digs out vulnerable systems like a rabbit.

  • 2019-06-23 @Devexporyan

    Hi, this tool is wonderfull. I wonder how could I exploit for certain IP addresses only (like from a txt file) instead of the full range of the company

  • 2019-06-22 @Desdersco

    Cyber criminals need this tool.

  • 2019-06-18 @Davison

    Obrigado pela

  • 2019-06-18 @Dectieta

    Nice but this also just gave every cybercriminals a heads up on which country to hit.

  • 2019-06-14 @CyBorn2

    Nice tool, I tried it on my server of 4 computers , Three of them are running Windows 10 and one Windows 7 I was surprised at the results all three of the Windows Ten and the Windows 7 had RDP 1 enabled but not vulnerable .

  • 2019-06-12 @Craziinext

    hello,thanks for a great tool, i try download from you link and i look the version is v1.8, where i can get new version?

  • 2019-06-09 @Contenterst

    thanks for a great tool! Performing an additional scan and exploit without having to restart the app would be great though _

  • 2019-06-08 @Chopito

    Thanks!

  • 2019-06-05 @ChickTough

    Thank You, Also tested the response of the antivirus SEP.

  • 2019-06-03 @ChatRead

    Thank you! It seems our prevention configuration on Kaspersky personal firewall is working.

  • 2019-06-02 @Canarcon

    Thank You! _

  • 2019-06-02 @CharmsPop

    NO RESPONSE means? Port closed? firewalled?

  • 2019-05-30 @BurkeReggae

    Unfortunately, my AV forbids me from downloading this. _

  • 2019-05-30 @Callethy

    Thanks for the tool! What credentials is using the program? Null? Otherwise you can have false negatives.

  • 2019-05-29 @Bridearu

    Great tool, thank you for taking the time to make it. I wish I could find something as simple to tell me if anything on my server is using RDP.

  • 2019-05-29 @Broadcaster

    OMG! That is so awesome, thank you so much.I

  • 2019-05-28 @Breamesh

    Thank you!

  • 2019-05-27 @Blueston

    Thank you for this tool. Can you add an option to exploit the current machine only? This will be helpful for home users, like me, who has only 1 Windows machine on the server. Thank you. Keep up the good work.

  • 2019-05-24 @Bluepoint

    Did you check this tool is whitelisted by AV? At least please check and command in VT link on this tool.

  • 2019-05-23 @Billeryxia

    Thank you for adding new function, this really helps in reporting.

  • 2019-05-21 @ArticleHenry

    I tried the latest version and its working fine. Thanks for fixing the issues. I had one other recommendation but saw someone else has already requested for it, running the scan on a different subnet without closing and re-launching the app.

  • 2019-05-20 @Aquafferb

    Hi, does it available on github for learning purposes?

  • 2019-05-20 @Aqueurce

    I checked few machines reported vulnerable by this tool however they had the latest CU installed, and other tools are not reporting them vulnerable.

  • 2019-05-19 @Angelicalge

    Thank you so much for sharing this utility

  • 2019-05-19 @Annonalum

    Greetings, and Thank You for spending your time creating this useful tool!

  • 2019-05-17 @Alzoesco

    Thanks your tool, i just test and it working.

  • 2019-05-16 @Aamultr

    Hi, thank you for providing such an easy method to exploit the systems. It would be great, however, if you could elaborate a little more how exactly it checks for vulnerable systems.

  • 2019-05-16 @Aluxysiq

    Thanks for your effort in making this! I