Selling Exploits

Can you provide proof that these are your methods?
 
Saw a spooki twitter get reset with that mail.com exploit, good luck selling these man.
 
Pity that you are not selling them anymore but what did you mean by exploits? Vulnerabilities in systems like for instance a remote root exploit, or a social engineering technique?
 
Cookies are required to use this site. You must accept them to continue using the site. Learn more…