Exploit code for CVE-2019-2729# CVE-2019-2729
Exploit code for CVE-2019-2729 Oracle Weblogic running on Windows.
Can create a callback to a CobaltStrike listener or a Metasploit handler with payload windows/meterpreter/reverse_tcp
Also have a non-beacon exploit that just executes commands on the underlying host. (exploit.py). This version also has proxy support enabled
[4.0K] /data/pocs/0eaba5ac937cdcbf4e2d94c2261187be30b68088
├── [339K] CVE-2019-2729.py
├── [338K] exploit.py
└── [ 344] README.md
0 directories, 3 files