dicompot
DICOM trap
A DICOM honeypot designed to detect and analyze malicious activity in medical imaging networks
DICOM Honeypot
24 stars
4 watching
8 forks
Language: Go
last commit: about 1 year ago
Linked from 1 awesome list
deceptiondicomdockergohoneypotmedicalmedical-imaging
Related projects:
Repository | Description | Stars |
---|---|---|
marist-innovation-lab/doloshoneypot | A honeypot tool to detect and track network attacks by simulating a compromised system's interface | 2 |
gfoss/phpmyadmin_honeypot | A honeypot designed to detect and log attempts to access unauthorized phpMyAdmin functionality | 66 |
honeytrap/honeytrap | A system for running and managing honeypots to detect and monitor malicious activity in computer networks. | 1,226 |
sahilm/hived | A honeypot system that detects and reports malicious network activity | 3 |
fnzv/yafh | A honeypot designed to detect and study malicious activity via SSH and TELNET connections | 9 |
desaster/kippo | An SSH honeypot designed to detect brute force attacks and log attacker interactions | 1,623 |
schmalle/medpot | An HL7/FHIR honeypot that emulates malicious network activity to detect security threats | 22 |
haxrob/amthoneypot | A honeypot designed to detect and capture attempts to exploit a specific Intel AMT firmware vulnerability | 17 |
mushorg/glutton | A honeypot designed to attract and detect malicious network traffic | 245 |
mdp/honeypot.go | A tool to detect and track unauthorized SSH attempts on a public machine | 28 |
omererdem/honeything | A honeypot designed to emulate vulnerabilities in TR-069 protocol devices for security testing and research purposes. | 121 |
tillmannw/honeytrap | A tool to detect and analyze malicious network connections by simulating well-known services | 94 |
mojachieee/go-honeypot | A honeypot server written in Go to detect and log malicious network activity. | 44 |
cypwnpwnsocute/redishoneypot | A high-interaction honeypot solution for detecting Redis protocol exploitation | 20 |
referefref/honeydet | A signature-based honeypot detection tool that uses multi-step and protocol-specific detection methods to identify potential security threats | 84 |