sshhipot
Honeypot
A tool that simulates an interactive SSH connection to detect and analyze potential attacks
High-interaction MitM SSH honeypot
168 stars
9 watching
46 forks
Language: Go
last commit: over 6 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
morian/blacknet | A honeypot system designed to detect and log SSH attempts on multiple IP addresses. | 21 |
sjinks/ssh-honeypotd | An SSH honeypot designed to detect and prevent unauthorized access attempts | 15 |
victpork/sshsyrup | An SSH honeypot solution that captures terminal activity and uploads to asciinema.org, allowing for analysis and storage of attacker interactions. | 96 |
mdp/honeypot.go | A tool to detect and track unauthorized SSH attempts on a public machine | 28 |
marist-innovation-lab/doloshoneypot | A honeypot tool to detect and track network attacks by simulating a compromised system's interface | 2 |
jaksi/sshesame | An SSH honeypot that logs activity without executing commands or making network requests | 1,543 |
paulmaddox/gohoney | An SSH honeypot designed to detect and record brute-force login attempts by recording commands executed in a fake shell environment. | 10 |
cymmetria/mtpot | A honeypot designed to detect and analyze network attacks by simulating vulnerable systems | 104 |
sjinks/mysql-honeypotd | A low-interaction MySQL honeypot designed to detect and deter MySQL-related attacks. | 32 |
schmalle/mysqlpot | A MySQL honeypot designed to detect and prevent unauthorized access attempts | 21 |
czardoz/hornet | A medium interaction SSH honeypot with sandboxed filesystems and cross-host interactions. | 22 |
ashmckenzie/go-sshoney | An SSH honeypot project designed to log and monitor unauthorized SSH connection attempts | 32 |
mrschyte/dockerpot | A Docker-based honeypot system for detecting and analyzing network attacks | 149 |
gfoss/phpmyadmin_honeypot | A honeypot designed to detect and log attempts to access unauthorized phpMyAdmin functionality | 66 |
tillmannw/honeytrap | A tool to detect and analyze malicious network connections by simulating well-known services | 94 |