Cymmetria / weblogic_honeypotLinks
WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.
☆32Updated 5 years ago
Alternatives and similar repositories for weblogic_honeypot
Users that are interested in weblogic_honeypot are comparing it to the libraries listed below
Sorting:
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 5 years ago
- initial commit☆44Updated 6 months ago
- It is a repository for Red Team emulation based on MITRE ATT&CK.☆16Updated 5 years ago
- Jira Information Gatherer☆28Updated 7 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- Cobaltstrike Aggressor Scripts☆28Updated 8 years ago
- CVE2020-0796 SMBv3 RCE☆61Updated 5 years ago
- ☆24Updated 5 years ago
- Is this IP a C2 server?☆28Updated 5 years ago
- A tool to analyse JMX API security level.☆43Updated 10 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆54Updated 8 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 8 years ago
- Socks5 server over Websockets☆40Updated 6 years ago
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Updated 5 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Updated 7 years ago
- Cobalt Strike Aggressor Scripts☆30Updated 8 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 2 years ago
- Zabbix Jsrpc.php Injection Exploit☆25Updated 8 years ago
- Community maintained list of most popular HIPS service and process names on a Windows Platform.☆43Updated 2 years ago
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Updated 3 years ago
- Splunk Dashboard for CobaltStrike logs☆89Updated 4 years ago
- Use to perform Microsoft exchange account brute-force.☆73Updated 4 years ago
- ☆29Updated 7 years ago
- Scan for open S3 buckets and dump☆37Updated 7 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆32Updated 8 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆52Updated 6 years ago
- checkO365 is a tool to check if a target domain is using O365☆84Updated 6 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 7 years ago