delilah

Attack detection system

A honeypot system designed to detect and identify attackers exploiting a specific Elasticsearch vulnerability

GitHub

23 stars
2 watching
7 forks
Language: Python
last commit: over 9 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
dinotools/dionaea A Python-based honeypot system designed to detect and analyze malicious activity 719
canadianjeff/honeywrt An intrusion detection system that mimics vulnerable services to attract and detect attackers 21
jordan-wright/elastichoney A tool designed to detect attackers exploiting vulnerabilities in Elasticsearch by simulating malicious data and triggering security responses. 186
revengecoming/demonhunter A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks 60
owasp/python-honeypot Automated deception framework to detect and respond to cyber threats 437
phype/telnet-iot-honeypot Detects and analyzes Botnet connections to identify malware patterns and networks 304
inguardians/toms_honeypot A Python-based project simulating a decoy system to detect and analyze malicious activity in computer networks. 26
cymmetria/strutshoneypot A honeypot solution designed to detect and block exploits targeting Apache 2 servers 72
qeeqbox/chameleon An active defense tool that simulates open ports to detect vulnerabilities and monitor network traffic 663
0xballpoint/trapster-community A multi-service honeypot solution for real-time threat detection and network security monitoring 28
sahilm/hived A honeypot system that detects and reports malicious network activity 3
marist-innovation-lab/doloshoneypot A honeypot tool to detect and track network attacks by simulating a compromised system's interface 2
cymmetria/mtpot A honeypot designed to detect and simulate common network attacks using Python 104
thomaspatzke/log4pot A honeypot tool designed to detect and analyze the Log4Shell vulnerability in web applications 91
naorlivne/dshp A honeypot designed to detect and respond to unauthorized access attempts with customizable alerts and automated responses. 16