elastichoney
Elasticsearch honeypot
A tool designed to detect attackers exploiting vulnerabilities in Elasticsearch by simulating malicious data and triggering security responses.
A Simple Elasticsearch Honeypot
186 stars
11 watching
54 forks
Language: Go
last commit: over 9 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| Captures attempts to exploit a known vulnerability in Elasticsearch by monitoring incoming requests and sending responses to a configured endpoint. | 27 |
| A honeypot project designed to detect and capture remote file inclusion (RFI) and local file inclusion (LFI) attacks by serving fake URLs that mimic vulnerable website paths. | 17 |
| A honeypot tool to detect and track network attacks by simulating a compromised system's interface | 2 |
| An intrusion detection system that mimics vulnerable services to attract and detect attackers | 21 |
| A PHP SDK for detecting and mitigating malicious traffic by identifying suspicious IP addresses and URLs. | 3 |
| A tool that creates a trap for unauthorized access to a networked device using a simulated telnet service | 1 |
| A tool designed to receive and analyze malware sent via Bluetooth connections | 245 |
| An active defense tool that simulates open ports to detect vulnerabilities and monitor network traffic | 664 |
| An SSH honeypot designed to detect and record brute-force login attempts by recording commands executed in a fake shell environment. | 11 |
| A honeypot system designed to detect and identify attackers exploiting a specific Elasticsearch vulnerability | 23 |
| A system to detect and analyze malicious activity on FTP connections. | 30 |
| A comprehensive package of 30 different honeypots in Python that can monitor network traffic and detect malicious activities | 704 |
| An SSH honeypot designed to detect and prevent unauthorized access attempts | 15 |
| A system for running and managing honeypots to detect and monitor malicious activity in computer networks. | 1,226 |
| A tool to detect and analyze malicious network connections by simulating well-known services | 94 |