seahorseELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)
Stars: ✭ 31 (-77.86%)
potdA high scalable low to medium interactive SSH/TCP honeypot using Linux Namespaces, capabilities, seccomp, cgroups designed for OpenWrt and IoT devices.
Stars: ✭ 28 (-80%)
HoneypotLow interaction honeypot that displays real time attacks
Stars: ✭ 348 (+148.57%)
twisted-honeypotsSSH, FTP and Telnet honeypots based on Twisted
Stars: ✭ 79 (-43.57%)
FattFATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic
Stars: ✭ 490 (+250%)
ConpotICS/SCADA honeypot
Stars: ✭ 853 (+509.29%)
mhn🍯 Analyze and Visualize Data from Modern Honey Network Servers with R
Stars: ✭ 16 (-88.57%)
Django Honeypot🍯 Generic honeypot utilities for use in django projects.
Stars: ✭ 284 (+102.86%)
anti-honeypot一款可以检测WEB蜜罐并阻断请求的Chrome插件,能够识别并阻断长亭D-sensor、墨安幻阵的部分溯源api
Stars: ✭ 38 (-72.86%)
weblogic honeypotWebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.
Stars: ✭ 30 (-78.57%)
VindicateToolLLMNR/NBNS/mDNS Spoofing Detection Toolkit
Stars: ✭ 40 (-71.43%)
Malware SamplesA collection of malware samples caught by several honeypots i manage
Stars: ✭ 863 (+516.43%)
rdppotRDP honeypot
Stars: ✭ 55 (-60.71%)
HoneypyA low to medium interaction honeypot.
Stars: ✭ 410 (+192.86%)
HosTaGeLow Interaction Mobile Honeypot
Stars: ✭ 58 (-58.57%)
SshesameA fake SSH server that lets everyone in and logs their activity
Stars: ✭ 1,062 (+658.57%)
honeykuA Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).
Stars: ✭ 56 (-60%)
HeraldingCredentials catching honeypot
Stars: ✭ 297 (+112.14%)
masscannedLet's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hosted alternative to GreyNoise.
Stars: ✭ 50 (-64.29%)
AcraDatabase security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
Stars: ✭ 726 (+418.57%)
Awesome-DeceptionAn awesome list of resources on deception-based security with honeypots and honeytokens
Stars: ✭ 61 (-56.43%)
ZKShSSearch shodan without any knowledge about its queries
Stars: ✭ 37 (-73.57%)
Opencanary webThe web management platform of honeypot
Stars: ✭ 547 (+290.71%)
techmapHoneypot's Tech Map
Stars: ✭ 43 (-69.29%)
UdpotSimple UDP honeypot script
Stars: ✭ 35 (-75%)
WebTrapThis project is designed to create deceptive webpages to deceive and redirect attackers away from real websites.
Stars: ✭ 45 (-67.86%)
DionaeaHome of the dionaea honeypot
Stars: ✭ 490 (+250%)
dystopiaLow to medium multithreaded Ubuntu Core honeypot coded in Python.
Stars: ✭ 59 (-57.86%)
Docker CowrieCowrie Docker GitHub repository
Stars: ✭ 68 (-51.43%)
ElasticpotPYElasticsearch honeypot written in Python with Bottle framework
Stars: ✭ 16 (-88.57%)
Honeylambdahoneyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top of AWS Lambda and Amazon API Gateway
Stars: ✭ 454 (+224.29%)
SentryPeerA distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot.
Stars: ✭ 108 (-22.86%)
Invisible captcha🍯 Unobtrusive and flexible spam protection for Rails apps
Stars: ✭ 851 (+507.86%)
HellPotHellPot is a portal to endless suffering meant to punish unruly HTTP bots.
Stars: ✭ 146 (+4.29%)
CowrieCowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
Stars: ✭ 3,810 (+2621.43%)
MimirOSINT Threat Intel Interface - CLI for HoneyDB
Stars: ✭ 104 (-25.71%)
Ddos RootsecDDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
Stars: ✭ 108 (-22.86%)
honeybits-winWindows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!
Stars: ✭ 20 (-85.71%)
SnareSuper Next generation Advanced Reactive honEypot
Stars: ✭ 311 (+122.14%)
django-antispamSpam protection tools for django applications.
Stars: ✭ 50 (-64.29%)
HoneytrapAdvanced Honeypot framework.
Stars: ✭ 938 (+570%)
stack-honeypotInserts a trap for spam bots into responses.
Stars: ✭ 22 (-84.29%)
WirespyFramework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
Stars: ✭ 293 (+109.29%)
SSHapendoesCapture passwords of login attempts on non-existent and disabled accounts.
Stars: ✭ 31 (-77.86%)
FrekiFreki is a tool to manipulate packets in usermode using NFQUEUE and golang.
Stars: ✭ 43 (-69.29%)
citrix-honeypotCitrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781 and login attempts
Stars: ✭ 24 (-82.86%)
DejavuDejaVU - Open Source Deception Framework
Stars: ✭ 265 (+89.29%)
fakesshA dockerized fake SSH server honeypot written in Go that logs login attempts.
Stars: ✭ 42 (-70%)
RouterosRouterOS Security Research Tooling and Proof of Concepts
Stars: ✭ 603 (+330.71%)
BurningDogsHoneypot log processor to create OTX Pulse entries
Stars: ✭ 31 (-77.86%)
BluehivePowerShell based Active Directory Honey User Account Management with Universal Dashboards
Stars: ✭ 126 (-10%)
Php Malware AnalysisDeobfuscation and analysis of PHP malware captured by a WordPress honey pot
Stars: ✭ 82 (-41.43%)
PyrdpRDP man-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
Stars: ✭ 567 (+305%)
sshsyrupA low-to-medium interaction SSH Honeypot with features to capture terminal activity and upload to asciinema.org
Stars: ✭ 84 (-40%)