 honeygrove
 honeygrove 
 Honeypot system
 A modular honeypot system that mimics industrial control systems to attract and analyze potential cyber threats.
A multi-purpose, modular medium-interaction honeypot based on Twisted.
20 stars
 9 watching
 8 forks
 
Language: HTML 
last commit: over 4 years ago 
Linked from   1 awesome list  
  brokercybersecurityhoneypottwisted 
 Related projects:
| Repository | Description | Stars | 
|---|---|---|
|  | A honeypot system that detects and reports malicious network activity | 3 | 
|  | A middleware that inserts a trap into responses to detect and prevent spam bot attempts. | 23 | 
|  | An honeypot system to analyze data by simulating common network services | 12 | 
|  | A web application honeypot system to attract malicious traffic and detect potential security threats. | 450 | 
|  | A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks | 61 | 
|  | An SSH honeypot that logs activity without executing commands or making network requests | 1,562 | 
|  | An endless honeypot designed to punish unruly HTTP bots by simulating a website and sending them a never-ending stream of data. | 898 | 
|  | A honeypot system designed to detect and log SSH attempts on multiple IP addresses. | 22 | 
|  | A simple honeypot system designed to detect port monitoring attacks by analyzing network traffic and triggering notifications when potential threats are detected. | 17 | 
|  | A honeypot system designed to detect and analyze HTTP requests using large language models | 440 | 
|  | A Flask-based web application that displays data collected from an SSH honeypot | 3 | 
|  | An SSH honeypot designed to detect and prevent unauthorized access attempts | 15 | 
|  | An HTTP honeypot designed to mislead and slow down unwanted web crawlers while collecting data | 101 | 
|  | A tool to collect intelligence about attackers targeting industrial control systems by simulating vulnerabilities in ICS networks | 1,258 | 
|  | A modular honeypot platform for detecting cyber threats by simulating web applications and triggering automated responses. | 54 |