dicompot

DICOM trap

A DICOM honeypot designed to detect and analyze malicious activity in medical imaging networks

DICOM Honeypot

GitHub

24 stars
4 watching
8 forks
Language: Go
last commit: about 1 year ago
Linked from 1 awesome list

deceptiondicomdockergohoneypotmedicalmedical-imaging

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
marist-innovation-lab/doloshoneypot A honeypot tool to detect and track network attacks by simulating a compromised system's interface 2
gfoss/phpmyadmin_honeypot A honeypot designed to detect and log attempts to access unauthorized phpMyAdmin functionality 66
honeytrap/honeytrap A system for running and managing honeypots to detect and monitor malicious activity in computer networks. 1,226
sahilm/hived A honeypot system that detects and reports malicious network activity 3
fnzv/yafh A honeypot designed to detect and study malicious activity via SSH and TELNET connections 9
desaster/kippo An SSH honeypot designed to detect brute force attacks and log attacker interactions 1,623
schmalle/medpot An HL7/FHIR honeypot that emulates malicious network activity to detect security threats 22
haxrob/amthoneypot A honeypot designed to detect and capture attempts to exploit a specific Intel AMT firmware vulnerability 17
mushorg/glutton A honeypot designed to attract and detect malicious network traffic 245
mdp/honeypot.go A tool to detect and track unauthorized SSH attempts on a public machine 28
omererdem/honeything A honeypot designed to emulate vulnerabilities in TR-069 protocol devices for security testing and research purposes. 121
tillmannw/honeytrap A tool to detect and analyze malicious network connections by simulating well-known services 94
mojachieee/go-honeypot A honeypot server written in Go to detect and log malicious network activity. 44
cypwnpwnsocute/redishoneypot A high-interaction honeypot solution for detecting Redis protocol exploitation 20
referefref/honeydet A signature-based honeypot detection tool that uses multi-step and protocol-specific detection methods to identify potential security threats 84