pghoney
Honeypot
A low-interaction Postgres honeypot designed to detect and respond to potential security threats by simulating a Postgres database
Low-interaction Postgres Honeypot
18 stars
2 watching
7 forks
Language: Go
last commit: 6 months ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
betheroot/sticky_elephant | A tool designed to detect and study PostgreSQL honeypot attacks | 11 |
fnzv/yafh | A honeypot designed to detect and study malicious activity via SSH and TELNET connections | 9 |
naorlivne/dshp | A simple honeypot system designed to detect and respond to unauthorized access attempts | 16 |
paulmaddox/gohoney | An SSH honeypot designed to detect and record brute-force login attempts by recording commands executed in a fake shell environment. | 10 |
cypwnpwnsocute/redishoneypot | A high-interaction honeypot solution for detecting Redis protocol exploitation | 20 |
johestephan/verysimplehoneypot | An honeypot system to analyze data by simulating common network services | 12 |
masood-m/yalih | Detects malicious websites by collecting and analyzing suspicious URLs, scripts, and network traffic | 69 |
mushorg/glutton | A honeypot designed to attract and detect malicious network traffic | 245 |
marist-innovation-lab/doloshoneypot | A honeypot tool to detect and track network attacks by simulating a compromised system's interface | 2 |
joshrendek/threat.gg-agent | A honeypot agent designed to detect and log username/password combinations | 38 |
phin3has/mailoney | A honeypot solution that detects and logs suspicious SMTP traffic | 254 |
revengecoming/demonhunter | A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks | 60 |
zeroq/amun | A Python-based low-interaction honeypot designed to detect and analyze malicious network activity | 59 |
gfoss/phpmyadmin_honeypot | A honeypot designed to detect and log attempts to access unauthorized phpMyAdmin functionality | 66 |
omererdem/honeything | A honeypot designed to emulate vulnerabilities in TR-069 protocol devices for security testing and research purposes. | 121 |