toms_honeypot
Decoy system simulator
A Python-based project simulating a decoy system to detect and analyze malicious activity in computer networks.
Tom's Honey Pot as seen in Applied Network Security Monitoring.
26 stars
5 watching
8 forks
Language: Python
last commit: almost 10 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| An honeypot system to analyze data by simulating common network services | 12 |
| A Python-based web application honeypot that simulates common web application vulnerabilities to detect and analyze potential threats. | 564 |
| An intrusion detection system designed to capture and analyze ssh interactions between an attacker and a modified OpenSSH deamon | 26 |
| A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks | 61 |
| Automated deception framework to detect and respond to cyber threats | 443 |
| A front-end web application designed to test and analyze network connections, simulating a honeypot for low-interaction attacks. | 66 |
| A high-interaction honeypot solution for detecting Redis protocol exploitation | 22 |
| A network-based system for detecting and mitigating malicious activity | 13 |
| A simple honeypot system to detect and respond to potential security threats. | 16 |
| A multi-service honeypot solution for real-time threat detection and network security monitoring | 28 |
| A honeypot designed to emulate vulnerabilities in TR-069 protocol devices for security testing and research purposes. | 121 |
| A low-interaction Postgres honeypot designed to detect and respond to potential security threats by simulating a Postgres database | 18 |
| A comprehensive package of 30 different honeypots in Python that can monitor network traffic and detect malicious activities | 704 |
| A honeypot tool to detect and track network attacks by simulating a compromised system's interface | 2 |
| A Python-based honeypot system designed to detect and analyze malicious activity | 719 |