dudeintheshell / blackhole
☆37Updated 9 years ago
Alternatives and similar repositories for blackhole:
Users that are interested in blackhole are comparing it to the libraries listed below
- CVE-2017-13089☆55Updated 7 years ago
- SQLChop reverse http proxy module☆32Updated 9 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 7 years ago
- Python Scanner for "ShellShock" (CVE-2014-6271)☆44Updated 10 years ago
- passive dns collector☆10Updated 7 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 7 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 9 years ago
- Snort rules☆35Updated 6 years ago
- 一个监控 pastebin 的敏感内容,并发微博的 bot☆15Updated 7 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆38Updated 7 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆36Updated 7 years ago
- using python to hack☆31Updated 8 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Updated 8 years ago
- Simple socket-based gateway to the Burp Collaborator☆33Updated 8 years ago
- ☆46Updated 8 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆31Updated 11 years ago
- CVE-2017-9791☆27Updated 7 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67Updated 6 years ago
- # Full overview of current vulnerability, exploit , fuzz, mitigation of current major Operation System(Windows, macOS, Linux, Android,iOS…☆52Updated 7 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 8 years ago
- ☆15Updated 8 years ago
- ☆89Updated 4 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Updated 6 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Updated 10 years ago
- Keyboard Weak Password☆28Updated 8 years ago
- Github Desktop RCE PoC☆28Updated 6 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- ☆11Updated 8 years ago
- DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API☆19Updated 6 years ago