Shockpot-Frontend
Honeypot stats viewer
An application that visualizes statistics from a honeypot network
3 stars
4 watching
0 forks
Language: PHP
last commit: almost 9 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
govcert-cz/wordpot-frontend | A tool to visualize statistics from Wordpot honeypot logs | 5 |
mfontani/kippo-stats | A web application that displays statistics about Kippo SSH honeypot usage and connections. | 18 |
referefref/modpot | A modular honeypot platform for detecting cyber threats by simulating web applications and triggering automated responses. | 54 |
czardoz/hornet | A medium interaction SSH honeypot with sandboxed filesystems and cross-host interactions. | 22 |
fzerorubigd/go0r | A simple SSH honeypot in Go to detect and prevent unauthorized access | 35 |
freak3dot/smart-honeypot | A script that generates an email form to collect sensitive information from attackers as part of a honeypot trap | 17 |
schmalle/medpot | An HL7/FHIR honeypot that emulates malicious network activity to detect security threats | 24 |
sjinks/mysql-honeypotd | A low-interaction MySQL honeypot designed to detect and deter MySQL-related attacks. | 32 |
mushorg/snare | A web application honeypot system to attract malicious traffic and detect potential security threats. | 448 |
mycert/espot | Captures attempts to exploit a known vulnerability in Elasticsearch by monitoring incoming requests and sending responses to a configured endpoint. | 27 |
gfoss/phpmyadmin_honeypot | A honeypot designed to detect and log attempts to access unauthorized phpMyAdmin functionality | 66 |
sahilm/hived | A honeypot system that detects and reports malicious network activity | 3 |
schmalle/honeyalarmg2 | A simplified UI tool for displaying honeypot alarm notifications | 4 |
kungfuguapo/honeypress | A Python-based honeypot system mimicking a vulnerable WordPress installation to detect and analyze security threats | 6 |
canadianjeff/honeywrt | An intrusion detection system that mimics vulnerable services to attract and detect attackers | 21 |