galah
Honeypot system
A honeypot system designed to detect and analyze HTTP requests using large language models
Galah: An LLM-powered web honeypot.
419 stars
10 watching
40 forks
Language: Go
last commit: about 1 month ago
Linked from 1 awesome list
golanghoneypotllmopenaiopenai-apisecuritysecurity-tools
Related projects:
Repository | Description | Stars |
---|---|---|
sahilm/hived | A honeypot system that detects and reports malicious network activity | 3 |
mojachieee/go-honeypot | A honeypot server written in Go to detect and log malicious network activity. | 44 |
ashmckenzie/go-sshoney | An SSH honeypot project designed to log and monitor unauthorized SSH connection attempts | 32 |
fzerorubigd/go0r | A simple SSH honeypot in Go to detect and prevent unauthorized access | 35 |
yvesago/imap-honey | An IMAP and SMTP honeypot tool written in Go. | 25 |
mariocandela/beelzebub | A framework for creating secure honeypot environments using AI and low-code development | 691 |
paulmaddox/gohoney | An SSH honeypot designed to detect and record brute-force login attempts by recording commands executed in a fake shell environment. | 11 |
schmalle/medpot | An HL7/FHIR honeypot that emulates malicious network activity to detect security threats | 23 |
johestephan/verysimplehoneypot | An honeypot system to analyze data by simulating common network services | 12 |
morian/blacknet | A honeypot system designed to detect and log SSH attempts on multiple IP addresses. | 21 |
fnzv/yafh | A honeypot designed to detect and study malicious activity via SSH and TELNET connections | 9 |
naorlivne/dshp | A simple honeypot system designed to receive and respond to fake connection attempts with customizable replies | 16 |
sec51/honeymail | A honeypot solution to detect and filter spam emails using an SMTP proxy | 28 |
gfoss/phpmyadmin_honeypot | A honeypot designed to detect and log attempts to access unauthorized phpMyAdmin functionality | 66 |
uhh-iss/honeygrove | A modular honeypot system that mimics industrial control systems to attract and analyze potential cyber threats. | 20 |