These aren't really surprising, to me at least, but I find them very enlightening. HBGary worked along side other companies to put together demos to sell zero-day exploit tools to the government. Two government agencies specifically mentioned in the Ars article are the Air Force and SOCOM. HBGary claims to have many zero-day exploits and even to have sold many of them to others. Here is a list:
VMware ESX and ESXi *
Win2K3 Terminal Services
Solaris 10 RPC
Adobe Flash *
Sun Java *
Win2k Professional & Server
XRK Rootkit and Keylogger *
Rootkit 2009 *
* signifies an exploit that has been sold with a non-exclusive license and can be resold to other companies.
This is a list directly from a HBGary email that was leaked recently when their servers were compromised by the hacker group Anonymous. Employees refer to these exploits as "Juicy Fruit" and apparently they were in high demand. One of the tools they developed to use these exploits is reportedly called "12 Monkeys." This was a purposed rootkit that ran completely invisible to the operating system because it had no process, or object for the operating system to be found. It also hides further by encrypting itself in the memory and randomly copying itself around in memory to escape detection.
I'll continue digging through for more "Juicy Fruit."