Adikso / minecraft-log4j-honeypot
Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam
☆101Updated 3 years ago
Alternatives and similar repositories for minecraft-log4j-honeypot:
Users that are interested in minecraft-log4j-honeypot are comparing it to the libraries listed below
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 2 months ago
- ABUSING WINDOWS TELEMETRY FOR PERSISTENCE☆139Updated 4 years ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆145Updated 3 years ago
- POC for CVE-2022-1388☆231Updated 2 years ago
- Log4j-rce☆34Updated 3 years ago
- Discord as a C2☆49Updated 4 years ago
- Basic Dart reverse shell code☆21Updated last year
- The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel☆159Updated 3 years ago
- Exploit for CVE-2021-4034☆93Updated 3 years ago
- CVE-2020-2021☆20Updated 4 years ago
- Windows UAC bypass techniques implemented and written in Go☆211Updated 2 years ago
- Copy and paste commands to quickly transfer files between hosts.☆25Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆105Updated 2 years ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆121Updated 2 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆176Updated 2 years ago
- Domain Borrowing PoC☆211Updated 3 years ago
- A Python gRPC Client Library for Sliver☆67Updated 2 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆125Updated 3 months ago
- bdvl☆112Updated 2 years ago
- Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server …☆104Updated 4 years ago
- CVE-2021-3560 Local PrivEsc Exploit☆78Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆89Updated 3 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 4 years ago
- ☆291Updated 7 months ago
- Post-exploitation agent for Merlin☆190Updated 4 months ago
- PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github☆61Updated 3 years ago
- LD_PRELOAD rootkit☆129Updated 11 months ago
- Deobfuscate Log4Shell payloads with ease.☆161Updated 2 years ago
- A robust Red Team proxy written in Go.☆159Updated 3 years ago
- ☆53Updated 3 years ago