dshp
Honeypot system
A simple honeypot system designed to detect and respond to unauthorized access attempts
damn simple honey pot
16 stars
3 watching
4 forks
Language: Python
last commit: over 8 years ago
Linked from 1 awesome list
honeypot
Related projects:
Repository | Description | Stars |
---|---|---|
revengecoming/demonhunter | A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks | 60 |
gfoss/phpmyadmin_honeypot | A honeypot designed to detect and log attempts to access unauthorized phpMyAdmin functionality | 66 |
d1str0/drupot | A honeypot project that mimics Drupal websites to detect and prevent security threats | 57 |
desaster/kippo | An SSH honeypot designed to detect brute force attacks and log attacker interactions | 1,623 |
jekil/udpot | A script designed to detect and deter DNS-based attacks by providing a honeypot-like service for DNS resolution, logging requests to a SQLite database. | 48 |
kryptoslogic/rdppot | A RDP honeypot system that mimics a vulnerable RDP endpoint to detect and analyze potential attacks. | 62 |
sahilm/hived | A honeypot system that detects and reports malicious network activity | 3 |
masood-m/yalih | Detects malicious websites by collecting and analyzing suspicious URLs, scripts, and network traffic | 69 |
schmalle/mysqlpot | A MySQL honeypot designed to detect and prevent unauthorized access attempts | 21 |
mushorg/snare | A web application honeypot system to attract malicious traffic and detect potential security threats. | 447 |
sjinks/ssh-honeypotd | An SSH honeypot designed to detect and prevent unauthorized access attempts | 15 |
0xballpoint/trapster-community | A multi-service honeypot solution for real-time threat detection and network security monitoring | 28 |
jadb/honeypot | A PHP SDK for detecting and mitigating malicious traffic by identifying suspicious IP addresses and URLs. | 3 |
chh/stack-honeypot | A middleware that inserts a trap into responses to detect and prevent spam bot attempts. | 23 |
canadianjeff/honeywrt | An intrusion detection system that mimics vulnerable services to attract and detect attackers | 21 |