MTPot
Honeypot
A honeypot designed to detect and analyze network attacks by simulating vulnerable systems
Open Source Telnet Honeypot
104 stars
13 watching
34 forks
Language: Python
last commit: over 7 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
phype/telnet-iot-honeypot | Detects and analyzes Botnet connections to identify malware patterns and networks | 305 |
marist-innovation-lab/doloshoneypot | A honeypot tool to detect and track network attacks by simulating a compromised system's interface | 2 |
mrschyte/dockerpot | A Docker-based honeypot system for detecting and analyzing network attacks | 149 |
omererdem/honeything | A honeypot designed to emulate vulnerabilities in TR-069 protocol devices for security testing and research purposes. | 121 |
morian/blacknet | A honeypot system designed to detect and log SSH attempts on multiple IP addresses. | 21 |
mushorg/snare | A web application honeypot system to attract malicious traffic and detect potential security threats. | 447 |
cymmetria/strutshoneypot | A honeypot designed to detect and prevent exploitation of a specific Apache Struts vulnerability | 72 |
cymmetria/honeycomb_plugins | A repository of plugins for the Honeycomb honeypot framework. | 27 |
dinotools/dionaea | A Python-based honeypot system designed to detect and analyze malicious activity | 713 |
stamparm/hontel | A honeypot system that simulates a Telnet service to detect and study botnet attacks | 161 |
qeeqbox/honeypots | A comprehensive package of 30 different honeypots in Python that can monitor network traffic and detect malicious activities | 693 |
kryptoslogic/rdppot | A RDP honeypot system that mimics a vulnerable RDP endpoint to detect and analyze potential attacks. | 62 |
desaster/kippo | An SSH honeypot designed to detect brute force attacks and log attacker interactions | 1,623 |
naorlivne/dshp | A simple honeypot system designed to detect and respond to unauthorized access attempts | 16 |
magisterquis/sshhipot | A tool that simulates an interactive SSH connection to detect and analyze potential attacks | 168 |