glutton
Honeypot
A honeypot designed to attract and detect malicious network traffic
Generic Low Interaction Honeypot
245 stars
21 watching
58 forks
Language: Go
last commit: 6 days ago
Linked from 1 awesome list
hacktoberfesthoneypot
Related projects:
Repository | Description | Stars |
---|---|---|
mushorg/snare | A web application honeypot system to attract malicious traffic and detect potential security threats. | 447 |
mushorg/conpot | A tool to collect intelligence about attackers targeting industrial control systems by simulating vulnerabilities in ICS networks | 1,243 |
sahilm/hived | A honeypot system that detects and reports malicious network activity | 3 |
mojachieee/go-honeypot | A honeypot server written in Go to detect and log malicious network activity. | 44 |
ginger51011/pandoras_pot | An HTTP honeypot designed to mislead and slow down unwanted web crawlers while collecting data | 96 |
schmalle/medpot | An HL7/FHIR honeypot that emulates malicious network activity to detect security threats | 22 |
mushorg/imhoneypot | A honeypot project designed to attract and detect malicious activity on instant messaging platforms by luring users into revealing sensitive information. | 16 |
gfoss/phpmyadmin_honeypot | A honeypot designed to detect and log attempts to access unauthorized phpMyAdmin functionality | 66 |
mushorg/glastopf | A Python-based web application honeypot that simulates common web application vulnerabilities to detect and analyze potential threats. | 561 |
sjinks/mysql-honeypotd | A low-interaction MySQL honeypot designed to detect and deter MySQL-related attacks. | 32 |
referefref/honeydet | A signature-based honeypot detection tool that uses multi-step and protocol-specific detection methods to identify potential security threats | 84 |
betheroot/pghoney | A low-interaction Postgres honeypot designed to detect and respond to potential security threats by simulating a Postgres database | 18 |
marist-innovation-lab/doloshoneypot | A honeypot tool to detect and track network attacks by simulating a compromised system's interface | 2 |
fnzv/yafh | A honeypot designed to detect and study malicious activity via SSH and TELNET connections | 9 |
zeerg/helix-honeypot | A Kubernetes API honeypot with Active Defense capabilities designed to detect and disrupt malicious activities | 39 |