honestly they seem to be the same. It's hard to know
For the first time I agree with you, actually there is not hundreds ways to do the same thing thus it does seem it's based on the same work, there is copies, open source work etc.
With a end product we can't really say who did what but it doesn't mean collusion of everyone, for example Linus do not work with or for Google, but Google made their cell phones out of his work.
With RE it does need just a bit of information to help someone to get rid of a security check previously broken, there is a lot of ways that partials exploits information may leaks.
We can't really know exactly how people got their exploits if they got help or not, if they copied another one exploit or if they just used open sourced things
But the belief of hackers all working together is barely true, we share sometimes exploits, but a lot of work is done individually most of the times and if all this work is released and open source it might help others to put pieces together to make something bigger and the the first guy might even be not aware of the existence of the third.
It's internet not a conspiracy, I'm not sure that my explanations are clears and my examples the most relevant but you admit that "It's hard to know", not knowing something doesn't means that people are trying to hide you those things.
You'll never know what I'm doing in my office at 4AM and it"s just because it"s not relevant to publish about the fact that I fixed a grub bootloader and drunk a coffee, the relevant part is the result, TX had published this relevant part, every one had actually.
For SX OS crack no ones will publish a things that is breaking 24% of the security check or a backloader that is just able to get tilte id from xci