lockness-Ko / xz-vulnerable-honeypotLinks
An ssh honeypot with the XZ backdoor. CVE-2024-3094
☆143Updated last year
Alternatives and similar repositories for xz-vulnerable-honeypot
Users that are interested in xz-vulnerable-honeypot are comparing it to the libraries listed below
Sorting:
- nysm is a stealth post-exploitation container.☆252Updated 3 weeks ago
- ☆233Updated 9 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆370Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆259Updated 2 weeks ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆189Updated last year
- reverse shell using curl☆206Updated 4 months ago
- Worlds First Public POC for CVE-2025-1974☆89Updated 3 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆270Updated 4 months ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆248Updated this week
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆323Updated last month
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆137Updated 4 months ago
- Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640☆108Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated 10 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆119Updated last month
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆130Updated 8 months ago
- CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2☆114Updated 3 months ago
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆104Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆237Updated last month
- Get root via TTY / TIOCSTI stuffing☆76Updated 2 months ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆226Updated last month
- eBPF hacks☆188Updated 7 months ago
- Different methods to get current username without using whoami☆178Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆182Updated 10 months ago
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆88Updated 8 months ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆83Updated 5 months ago
- MOVEit CVE-2023-34362☆138Updated 2 years ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆142Updated 6 months ago
- SSH Zero-Day Made By ClumsyLulz☆124Updated 4 months ago
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆91Updated last year
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆86Updated 10 months ago