kippo
Honeypot
An SSH honeypot designed to detect brute force attacks and log attacker interactions
Kippo - SSH Honeypot
2k stars
84 watching
277 forks
Language: Python
last commit: about 1 year ago
Linked from 5 awesome lists
Related projects:
Repository | Description | Stars |
---|---|---|
gregcmartin/kippo_junos | A honeypot designed to log and track brute force SSH attacks, allowing for the analysis of attacker interactions. | 10 |
andrew-morris/kippo_detect | Detects and alerts on the presence of a Kippo SSH honeypot instance externally | 56 |
kryptoslogic/rdppot | A RDP honeypot system that mimics a vulnerable RDP endpoint to detect and analyze potential attacks. | 62 |
naorlivne/dshp | A simple honeypot system designed to detect and respond to unauthorized access attempts | 16 |
cryptix720/hudinx | A honeypot designed to detect and log brute force SSH attacks by simulating a vulnerable system | 5 |
morian/blacknet | A honeypot system designed to detect and log SSH attempts on multiple IP addresses. | 21 |
jedie/django-kippo | An integration layer for the kippo SSH honeypot with Django's administrative interface | 12 |
sjinks/ssh-honeypotd | An SSH honeypot designed to detect and prevent unauthorized access attempts | 15 |
aelth/ddospot | A platform for tracking and monitoring UDP-based Distributed Denial of Service attacks | 50 |
ppacher/honeyssh | Automated logging and rejection of brute-force SSH login attempts | 12 |
czardoz/hornet | A medium interaction SSH honeypot with sandboxed filesystems and cross-host interactions. | 22 |
revengecoming/demonhunter | A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks | 60 |
victpork/sshsyrup | An SSH honeypot solution that captures terminal activity and uploads to asciinema.org, allowing for analysis and storage of attacker interactions. | 96 |
droberson/ssh-honeypot | A honeypot program that logs IP addresses, usernames, and passwords of incoming SSH connections. | 624 |
kungfuguapo/honeypress | A Python-based honeypot system mimicking a vulnerable WordPress installation to detect and analyze security threats | 6 |