DolosHoneypot

Honeypot

A honeypot tool to detect and track network attacks by simulating a compromised system's interface

GitHub

2 stars
3 watching
1 forks
Language: CSS
last commit: over 6 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
mrschyte/dockerpot A Docker-based honeypot system for detecting and analyzing network attacks 149
marist-innovation-lab/pasitheahoneypot A Java-based API honeypot designed to detect and prevent malicious API requests 2
cymmetria/mtpot A honeypot designed to detect and analyze network attacks by simulating vulnerable systems 104
tillmannw/honeytrap A tool to detect and analyze malicious network connections by simulating well-known services 94
canadianjeff/honeywrt An intrusion detection system that mimics vulnerable services to attract and detect attackers 21
andrewmichaelsmith/manuka A Docker-based honeypot setup script to simulate network attacks and detect malware 24
balte/telnethoney A tool that creates a trap for unauthorized access to a networked device using a simulated telnet service 1
schmalle/servletpot An open-source honeypot web application designed to detect and analyze malware, simulating a vulnerable target for attackers to engage with. 14
naorlivne/dshp A simple honeypot system designed to detect and respond to unauthorized access attempts 16
ginger51011/pandoras_pot An HTTP honeypot designed to mislead and slow down unwanted web crawlers while collecting data 96
batchmcnulty/malbait A honeypot program designed to waste the time of hackers by simulating vulnerable servers and recording hostile traffic. 8
schmalle/mysqlpot A MySQL honeypot designed to detect and prevent unauthorized access attempts 21
helospark/tomcat-manager-honeypot An application that mimics Tomcat manager endpoints to detect and log potential attacks 11
jadb/honeypot A PHP SDK for detecting and mitigating malicious traffic by identifying suspicious IP addresses and URLs. 3
mushorg/snare A web application honeypot system to attract malicious traffic and detect potential security threats. 447