pandoras_pot 
 Honeypot
 An HTTP honeypot designed to mislead and slow down unwanted web crawlers while collecting data
HTTP honeypot to punish and educate unruly web crawlers, written in Rust (🚀)
101 stars
 3 watching
 4 forks
 
Language: Rust 
last commit: 11 months ago   deceptionhoneypothttprustserverstressweb 
 Related projects:
| Repository | Description | Stars | 
|---|---|---|
|    |  A network honeypot that uses protocol guessing and safe string display to detect potential security threats. | 31 | 
|    |  An endless honeypot designed to punish unruly HTTP bots by simulating a website and sending them a never-ending stream of data. | 898 | 
|    |  A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks | 61 | 
|    |  A honeypot that emulates a USB storage device to detect and trap malware that spreads through such devices | 97 | 
|    |  An open-source honeypot web application designed to detect and analyze malware, simulating a vulnerable target for attackers to engage with. | 14 | 
|    |  A web application honeypot system to attract malicious traffic and detect potential security threats. | 450 | 
|    |  A honeypot designed to attract and detect malicious network traffic | 247 | 
|    |  A Node.js honeypot designed to run in small environments as a security testing tool | 45 | 
|    |  A simple honeypot system to detect and respond to potential security threats. | 16 | 
|    |  A honeypot server written in Go to detect and log malicious network activity. | 43 | 
|    |  A honeypot tool to detect and track network attacks by simulating a compromised system's interface | 2 | 
|    |  A network-based system for detecting and mitigating malicious activity | 13 | 
|    |  A honeypot system designed to detect and analyze spam emails via an SMTP protocol | 28 | 
|    |  A honeypot program designed to waste the time of hackers by simulating vulnerable servers and recording hostile traffic. | 8 | 
|    |  A PHP SDK for detecting and mitigating malicious traffic by identifying suspicious IP addresses and URLs. | 3 |