threat.gg-agent

Honeypot detector

A honeypot agent designed to detect and log username/password combinations

A SSH Server in Go that logs username/password combos

GitHub

38 stars
4 watching
12 forks
Language: PureBasic
last commit: 18 days ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
betheroot/pghoney A low-interaction Postgres honeypot designed to detect and respond to potential security threats by simulating a Postgres database 18
mojachieee/go-honeypot A honeypot server written in Go to detect and log malicious network activity. 43
sahilm/hived A honeypot system that detects and reports malicious network activity 3
fzerorubigd/go0r A simple SSH honeypot in Go to detect and prevent unauthorized access 35
jaksi/sshesame An SSH honeypot that logs activity without executing commands or making network requests 1,551
paulmaddox/gohoney An SSH honeypot designed to detect and record brute-force login attempts by recording commands executed in a fake shell environment. 11
ashmckenzie/go-sshoney An SSH honeypot project designed to log and monitor unauthorized SSH connection attempts 32
gregcmartin/kippo_junos A honeypot designed to log and track brute force SSH attacks, allowing for the analysis of attacker interactions. 10
schmalle/medpot An HL7/FHIR honeypot that emulates malicious network activity to detect security threats 24
sjinks/ssh-honeypotd An SSH honeypot designed to detect and prevent unauthorized access attempts 15
cypwnpwnsocute/redishoneypot A high-interaction honeypot solution for detecting Redis protocol exploitation 22
revengecoming/demonhunter A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks 60
0x4d31/galah A honeypot system designed to detect and analyze HTTP requests using large language models 419
0xballpoint/trapster-community A multi-service honeypot solution for real-time threat detection and network security monitoring 28
fnzv/yafh A honeypot designed to detect and study malicious activity via SSH and TELNET connections 9