weblogic_honeypot
Vulnerability detector
Detects Remote Code Execution vulnerability in Oracle WebLogic Server component
WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.
32 stars
5 watching
12 forks
Language: Python
last commit: almost 5 years ago
Linked from 1 awesome list
deceptionexecution-vulnerabilityhoneypotoraclesecuritysecurity-toolssecurity-vulnerabilityvulnerabilityweblogicweblogic-server
Related projects:
Repository | Description | Stars |
---|---|---|
| Detects directory traversal vulnerabilities in Oracle Hospitality Simphony component | 15 |
| A low-interaction honeypot to detect and prevent exploitation of CVE-2018-0101 vulnerability in Cisco ASA components | 51 |
| A honeypot tool designed to detect and analyze the Log4Shell vulnerability in web applications | 91 |
| A comprehensive package of 30 different honeypots in Python that can monitor network traffic and detect malicious activities | 704 |
| Exploiting a Remote Code Execution vulnerability in WebLogic T3/IIOP | 79 |
| A honeypot project designed to detect and capture remote file inclusion (RFI) and local file inclusion (LFI) attacks by serving fake URLs that mimic vulnerable website paths. | 17 |
| A tool designed to detect and block specific Apache Struts vulnerabilities by mimicking a web application | 72 |
| A simple serverless application designed to create and monitor fake HTTP endpoints for security testing | 511 |
| A simple honeypot system to detect and respond to potential security threats. | 16 |
| Exploits a vulnerability in Oracle WebLogic Server | 103 |
| A RDP honeypot system that mimics a vulnerable RDP endpoint to detect and analyze potential attacks. | 63 |
| A MySQL honeypot designed to detect and prevent unauthorized access attempts | 21 |
| An open-source honeypot framework for detecting attackers in NoSQL databases | 101 |
| An intrusion detection system that mimics vulnerable services to attract and detect attackers | 21 |
| A honeypot designed to detect and analyze Mirai-type attacks by simulating a vulnerable network service. | 104 |