VerySimpleHoneypot
Honeypot system
An honeypot system to analyze data by simulating common network services
Fetch all Honeypot
12 stars
3 watching
8 forks
Language: Python
last commit: about 6 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
phype/telnet-iot-honeypot | Detects and analyzes Botnet connections to identify malware patterns and networks | 305 |
naorlivne/dshp | A simple honeypot system designed to detect and respond to unauthorized access attempts | 16 |
morian/blacknet | A honeypot system designed to detect and log SSH attempts on multiple IP addresses. | 21 |
jpyorre/intelligenthoneynet | Automates analysis and visualization of network security incident data from various honeypot systems. | 62 |
inguardians/toms_honeypot | A Python-based project simulating a decoy system to detect and analyze malicious activity in computer networks. | 26 |
mushorg/snare | A web application honeypot system to attract malicious traffic and detect potential security threats. | 447 |
omererdem/honeything | A honeypot designed to emulate vulnerabilities in TR-069 protocol devices for security testing and research purposes. | 121 |
uhh-iss/honeygrove | A modular honeypot system that mimics industrial control systems to attract and analyze potential cyber threats. | 20 |
betheroot/pghoney | A low-interaction Postgres honeypot designed to detect and respond to potential security threats by simulating a Postgres database | 18 |
blaverick62/siren | A network-based system for detecting and mitigating malicious activity | 13 |
0x4d31/galah | A honeypot system designed to detect and analyze HTTP requests using large language models | 415 |
qeeqbox/honeypots | A comprehensive package of 30 different honeypots in Python that can monitor network traffic and detect malicious activities | 693 |
cypwnpwnsocute/redishoneypot | A high-interaction honeypot solution for detecting Redis protocol exploitation | 20 |
marist-innovation-lab/doloshoneypot | A honeypot tool to detect and track network attacks by simulating a compromised system's interface | 2 |
revengecoming/demonhunter | A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks | 60 |