HosTaGeLow Interaction Mobile Honeypot
Stars: ✭ 58 (+34.88%)
masscannedLet's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hosted alternative to GreyNoise.
Stars: ✭ 50 (+16.28%)
rdppotRDP honeypot
Stars: ✭ 55 (+27.91%)
prickly-peteA script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
Stars: ✭ 29 (-32.56%)
HeraldingCredentials catching honeypot
Stars: ✭ 297 (+590.7%)
honeykuA Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).
Stars: ✭ 56 (+30.23%)
anti-honeypot一款可以检测WEB蜜罐并阻断请求的Chrome插件,能够识别并阻断长亭D-sensor、墨安幻阵的部分溯源api
Stars: ✭ 38 (-11.63%)
seahorseELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)
Stars: ✭ 31 (-27.91%)
TrapdoorServerless honeytoken 🕵🏻♂️
Stars: ✭ 70 (+62.79%)
HoneypotLow interaction honeypot that displays real time attacks
Stars: ✭ 348 (+709.3%)
PyrdpRDP man-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
Stars: ✭ 567 (+1218.6%)
potdA high scalable low to medium interactive SSH/TCP honeypot using Linux Namespaces, capabilities, seccomp, cgroups designed for OpenWrt and IoT devices.
Stars: ✭ 28 (-34.88%)
Django Honeypot🍯 Generic honeypot utilities for use in django projects.
Stars: ✭ 284 (+560.47%)
mhn🍯 Analyze and Visualize Data from Modern Honey Network Servers with R
Stars: ✭ 16 (-62.79%)
ConpotICS/SCADA honeypot
Stars: ✭ 853 (+1883.72%)
twisted-honeypotsSSH, FTP and Telnet honeypots based on Twisted
Stars: ✭ 79 (+83.72%)
sshsyrupA low-to-medium interaction SSH Honeypot with features to capture terminal activity and upload to asciinema.org
Stars: ✭ 84 (+95.35%)
weblogic honeypotWebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.
Stars: ✭ 30 (-30.23%)
FattFATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic
Stars: ✭ 490 (+1039.53%)
imap-honeyIMAP or SMTP honeypot written in Golang
Stars: ✭ 22 (-48.84%)
dystopiaLow to medium multithreaded Ubuntu Core honeypot coded in Python.
Stars: ✭ 59 (+37.21%)
honeycombAn extensible honeypot framework
Stars: ✭ 93 (+116.28%)
CowrieCowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
Stars: ✭ 3,810 (+8760.47%)
ElasticpotPYElasticsearch honeypot written in Python with Bottle framework
Stars: ✭ 16 (-62.79%)
RouterosRouterOS Security Research Tooling and Proof of Concepts
Stars: ✭ 603 (+1302.33%)
SentryPeerA distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot.
Stars: ✭ 108 (+151.16%)
SnareSuper Next generation Advanced Reactive honEypot
Stars: ✭ 311 (+623.26%)
HellPotHellPot is a portal to endless suffering meant to punish unruly HTTP bots.
Stars: ✭ 146 (+239.53%)
Invisible captcha🍯 Unobtrusive and flexible spam protection for Rails apps
Stars: ✭ 851 (+1879.07%)
MimirOSINT Threat Intel Interface - CLI for HoneyDB
Stars: ✭ 104 (+141.86%)
WirespyFramework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
Stars: ✭ 293 (+581.4%)
honeybits-winWindows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!
Stars: ✭ 20 (-53.49%)
Opencanary webThe web management platform of honeypot
Stars: ✭ 547 (+1172.09%)
django-antispamSpam protection tools for django applications.
Stars: ✭ 50 (+16.28%)
DejavuDejaVU - Open Source Deception Framework
Stars: ✭ 265 (+516.28%)
stack-honeypotInserts a trap for spam bots into responses.
Stars: ✭ 22 (-48.84%)
UdpotSimple UDP honeypot script
Stars: ✭ 35 (-18.6%)
SSHapendoesCapture passwords of login attempts on non-existent and disabled accounts.
Stars: ✭ 31 (-27.91%)
BurningDogsHoneypot log processor to create OTX Pulse entries
Stars: ✭ 31 (-27.91%)
citrix-honeypotCitrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781 and login attempts
Stars: ✭ 24 (-44.19%)
DionaeaHome of the dionaea honeypot
Stars: ✭ 490 (+1039.53%)
fakesshA dockerized fake SSH server honeypot written in Go that logs login attempts.
Stars: ✭ 42 (-2.33%)
Awesome-DeceptionAn awesome list of resources on deception-based security with honeypots and honeytokens
Stars: ✭ 61 (+41.86%)
ZKShSSearch shodan without any knowledge about its queries
Stars: ✭ 37 (-13.95%)
HoneytrapAdvanced Honeypot framework.
Stars: ✭ 938 (+2081.4%)
Loki一个轻量级Web蜜罐 - A Little Web Honeypot.🍯🍯🍯🐝🐝🐝
Stars: ✭ 151 (+251.16%)
techmapHoneypot's Tech Map
Stars: ✭ 43 (+0%)
Ehoney安全、快捷、高交互、企业级的蜜罐管理系统,护网;支持多种协议蜜罐、蜜签、诱饵等功能。A safe, fast, highly interactive and enterprise level honeypot management system, supports multiple protocol honeypots, honeytokens, baits and other functions.
Stars: ✭ 1,051 (+2344.19%)
Honeylambdahoneyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top of AWS Lambda and Amazon API Gateway
Stars: ✭ 454 (+955.81%)
WebTrapThis project is designed to create deceptive webpages to deceive and redirect attackers away from real websites.
Stars: ✭ 45 (+4.65%)
Malware SamplesA collection of malware samples caught by several honeypots i manage
Stars: ✭ 863 (+1906.98%)
AcraDatabase security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
Stars: ✭ 726 (+1588.37%)
HoneypyA low to medium interaction honeypot.
Stars: ✭ 410 (+853.49%)
VindicateToolLLMNR/NBNS/mDNS Spoofing Detection Toolkit
Stars: ✭ 40 (-6.98%)