hornet

Honeypot

A medium interaction SSH honeypot with sandboxed filesystems and cross-host interactions.

SSH Multipot

GitHub

22 stars
4 watching
2 forks
Language: Python
last commit: over 6 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
morian/blacknet A honeypot system designed to detect and log SSH attempts on multiple IP addresses. 21
mushorg/snare A web application honeypot system to attract malicious traffic and detect potential security threats. 447
naorlivne/dshp A simple honeypot system designed to detect and respond to unauthorized access attempts 16
sjinks/ssh-honeypotd An SSH honeypot designed to detect and prevent unauthorized access attempts 15
victpork/sshsyrup An SSH honeypot solution that captures terminal activity and uploads to asciinema.org, allowing for analysis and storage of attacker interactions. 96
desaster/kippo An SSH honeypot designed to detect brute force attacks and log attacker interactions 1,623
mushorg/conpot A tool to collect intelligence about attackers targeting industrial control systems by simulating vulnerabilities in ICS networks 1,243
revengecoming/demonhunter A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks 60
gregcmartin/kippo_junos A honeypot designed to log and track brute force SSH attacks, allowing for the analysis of attacker interactions. 10
sahilm/hived A honeypot system that detects and reports malicious network activity 3
zeerg/helix-honeypot A Kubernetes API honeypot with Active Defense capabilities designed to detect and disrupt malicious activities 39
0xballpoint/trapster-community A multi-service honeypot solution for real-time threat detection and network security monitoring 25
mrschyte/dockerpot A Docker-based honeypot system for detecting and analyzing network attacks 149
canadianjeff/honeywrt An intrusion detection system that mimics vulnerable services to attract and detect attackers 21
schmalle/medpot An HL7/FHIR honeypot that emulates malicious network activity to detect security threats 22