All Projects → hrbrmstr → mhn

hrbrmstr / mhn

Licence: other
🍯 Analyze and Visualize Data from Modern Honey Network Servers with R

Programming Languages

r
7636 projects

Projects that are alternatives of or similar to mhn

Trapdoor
Serverless honeytoken 🕵🏻‍♂️
Stars: ✭ 70 (+337.5%)
Mutual labels:  honeypot
curlconverter
➰ ➡️ ➖ Translate cURL command lines into parameters for use with httr or actual httr calls (R)
Stars: ✭ 86 (+437.5%)
Mutual labels:  r-cyber
gdns
Tools to work with the Google DNS over HTTPS API in R
Stars: ✭ 23 (+43.75%)
Mutual labels:  r-cyber
Ehoney
安全、快捷、高交互、企业级的蜜罐管理系统,护网;支持多种协议蜜罐、蜜签、诱饵等功能。A safe, fast, highly interactive and enterprise level honeypot management system, supports multiple protocol honeypots, honeytokens, baits and other functions.
Stars: ✭ 1,051 (+6468.75%)
Mutual labels:  honeypot
prickly-pete
A script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
Stars: ✭ 29 (+81.25%)
Mutual labels:  honeypot
fakessh
A dockerized fake SSH server honeypot written in Go that logs login attempts.
Stars: ✭ 42 (+162.5%)
Mutual labels:  honeypot
Telnet Iot Honeypot
Python telnet honeypot for catching botnet binaries
Stars: ✭ 252 (+1475%)
Mutual labels:  honeypot
masscanned
Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hosted alternative to GreyNoise.
Stars: ✭ 50 (+212.5%)
Mutual labels:  honeypot
ZKShS
Search shodan without any knowledge about its queries
Stars: ✭ 37 (+131.25%)
Mutual labels:  honeypot
twisted-honeypots
SSH, FTP and Telnet honeypots based on Twisted
Stars: ✭ 79 (+393.75%)
Mutual labels:  honeypot
imap-honey
IMAP or SMTP honeypot written in Golang
Stars: ✭ 22 (+37.5%)
Mutual labels:  honeypot
pdfbox
📄◻️ Create, Maniuplate and Extract Data from PDF Files (R Apache PDFBox wrapper)
Stars: ✭ 46 (+187.5%)
Mutual labels:  r-cyber
DemonHunter
Distributed Honeypot
Stars: ✭ 54 (+237.5%)
Mutual labels:  honeypot
wayback
⏪ Tools to Work with the Various Internet Archive Wayback Machine APIs
Stars: ✭ 52 (+225%)
Mutual labels:  r-cyber
reapr
🕸→ℹ️ Reap Information from Websites
Stars: ✭ 14 (-12.5%)
Mutual labels:  r-cyber
honeycomb
An extensible honeypot framework
Stars: ✭ 93 (+481.25%)
Mutual labels:  honeypot
weblogic honeypot
WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.
Stars: ✭ 30 (+87.5%)
Mutual labels:  honeypot
stack-honeypot
Inserts a trap for spam bots into responses.
Stars: ✭ 22 (+37.5%)
Mutual labels:  honeypot
SSHapendoes
Capture passwords of login attempts on non-existent and disabled accounts.
Stars: ✭ 31 (+93.75%)
Mutual labels:  honeypot
citrix-honeypot
Citrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781 and login attempts
Stars: ✭ 24 (+50%)
Mutual labels:  honeypot

mhn is an R package to interface with the MHN API and (eventually) provide tools to analyze and visualize MHN data.

The API wrapper functions in this package all rely on a MHN server API key residing in the environment variable MHN_API_KEY or being passed in as a parameter. The former is useful in simple deplpoyments where there is only one MHN server. In such cases, the easiest way to accomplish this is to set it in the .Renviron file in your home directory.

This package pairs nicely with:

The following functions are implemented:

  • all_metadata: Get all collected metadata
  • attacker_stats: Get attacker (IP) statistics
  • feed_info: Get data for a specific hpfeed
  • hp_feeds: Getthe raw hpfeeds data collected over a specific channel.
  • intel_feed: Get intel feed
  • ip_metadata: Get IP metadata (mainly from 'p0f' honeypot data)
  • metadata_for: Get metadata for a specific id
  • mhn_api_key: Get or set MHN_API_KEY value
  • mhn_dork: MHN dork (I have no idea what this is tho)
  • mhn_file: MHN file (I have no idea what this is tho)
  • mhn_url: MHN url (I have no idea what this is tho)
  • sensors: Get sensors.
  • sessions: Get normalized sessions/connection data
  • session_info: Get data for a specific attack session
  • top_attackers: Get top attackers

News

  • Version 0.0.1.9000 : paarmeterized the MHN URL
  • Version 0.0.0.9000 : initial release

Installation

devtools::install_github("hrbrmstr/mhn")

Usage

library(mhn)

# current verison
packageVersion("mhn")
#> [1] '0.0.1.9000'

library(dplyr)
library(ggplo2)
library(ggthemes)
library(scales)

ssns <- sessions(hours_ago=24)$data

port_tots <- count(ssns, destination_port)
gg <- ggplot(port_tots)
gg <- gg + geom_bar(stat="identity",
                    aes(x=reorder(destination_port, n), y=n))
gg <- gg + geom_text(aes(x=reorder(destination_port, n), y=n, label=comma(n)), 
                     hjust=-0.5, size=3)
gg <- gg + scale_x_discrete(expand=c(0,0))
gg <- gg + scale_y_continuous(expand=c(0,0), limits=c(0, extendrange(port_tots$n)[2]))
gg <- gg + coord_flip()
gg <- gg + labs(x=NULL, y=NULL, title="Port counts last 24 hrs\n")
gg <- gg + theme_tufte(base_family="Lato")
gg <- gg + theme(axis.ticks.y=element_blank())
gg <- gg + theme(axis.text.x=element_blank())
gg <- gg + theme(axis.ticks.x=element_blank())
gg <- gg + theme(plot.title=element_text(hjust=0))
gg

Test Results

library(mhn)
library(testthat)

date()
#> [1] "Sat Aug 22 12:30:25 2015"

test_dir("tests/")
#> testthat results ========================================================================================================
#> OK: 0 SKIPPED: 0 FAILED: 0
#> 
#> DONE

Code of Conduct

Please note that this project is released with a Contributor Code of Conduct. By participating in this project you agree to abide by its terms.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].