HoneyPress

Honeypot

A Python-based honeypot system mimicking a vulnerable WordPress installation to detect and analyze security threats

python based WordPress honeypot in a docker container

GitHub

6 stars
2 watching
11 forks
Language: PHP
last commit: about 4 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
gfoss/phpmyadmin_honeypot A honeypot designed to detect and log attempts to access unauthorized phpMyAdmin functionality 66
kryptoslogic/rdppot A RDP honeypot system that mimics a vulnerable RDP endpoint to detect and analyze potential attacks. 63
naorlivne/dshp A simple honeypot system to detect and respond to potential security threats. 16
alexbredo/honeypot-ftp A system to detect and analyze malicious activity on FTP connections. 30
desaster/kippo An SSH honeypot designed to detect brute force attacks and log attacker interactions 1,633
fnzv/yafh A honeypot designed to detect and study malicious activity via SSH and TELNET connections 9
referefref/modpot A modular honeypot platform for detecting cyber threats by simulating web applications and triggering automated responses. 54
revengecoming/demonhunter A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks 61
canadianjeff/honeywrt An intrusion detection system that mimics vulnerable services to attract and detect attackers 21
jadb/honeypot A PHP SDK for detecting and mitigating malicious traffic by identifying suspicious IP addresses and URLs. 3
andrewmichaelsmith/manuka A Docker-based honeypot setup script to simulate network attacks and detect malware 24
gbrindisi/wordpot A tool to detect WordPress probes by simulating common file requests and responses. 180
freak3dot/wp-smart-honeypot Reduces comment spam on WordPress sites by using a smarter honeypot strategy 28
mrschyte/dockerpot A Docker-based honeypot system for detecting and analyzing network attacks 148
rshipp/slipm-honeypot A simple honeypot system designed to detect port monitoring attacks by analyzing network traffic and triggering notifications when potential threats are detected. 17