glastopf
Vulnerability simulator
A Python-based web application honeypot that simulates common web application vulnerabilities to detect and analyze potential threats.
Web Application Honeypot
564 stars
51 watching
168 forks
Language: Python
last commit: 8 months ago
Linked from 2 awesome lists
Related projects:
Repository | Description | Stars |
---|---|---|
| A web application honeypot system to attract malicious traffic and detect potential security threats. | 450 |
| A Python-based project simulating a decoy system to detect and analyze malicious activity in computer networks. | 26 |
| A front-end web application designed to test and analyze network connections, simulating a honeypot for low-interaction attacks. | 66 |
| A honeypot designed to attract and detect malicious network traffic | 247 |
| An Android app designed to demonstrate common web application vulnerabilities and provide training in secure coding practices. | 10 |
| A tool to collect intelligence about attackers targeting industrial control systems by simulating vulnerabilities in ICS networks | 1,258 |
| Automated deception framework to detect and respond to cyber threats | 443 |
| A web application designed to simulate vulnerabilities and demonstrate the importance of proper validation and logging. | 31 |
| An intentionally vulnerable web application designed to aid in learning and practicing web security skills | 1,282 |
| A penetration testing tool designed to simulate real-world web application vulnerabilities. | 69 |
| A modular honeypot platform for detecting cyber threats by simulating web applications and triggering automated responses. | 54 |
| An intrusion detection system designed to capture and analyze ssh interactions between an attacker and a modified OpenSSH deamon | 26 |
| An educational project simulating common web app vulnerabilities for teaching security best practices | 186 |
| A high-interaction honeypot solution for detecting Redis protocol exploitation | 22 |
| A tool for simulating phishing attacks on AWS SSO using a serverless architecture and automated deployment. | 31 |