modpot
Honeypot platform
A modular honeypot platform for detecting cyber threats by simulating web applications and triggering automated responses.
Modular web-application honeypot platform built using go and gin
54 stars
2 watching
1 forks
Language: HTML
last commit: 10 months ago
Linked from 1 awesome list
cticyber-threat-intelligencegolanghoneypot
Related projects:
Repository | Description | Stars |
---|---|---|
| A signature-based honeypot detection tool that uses multi-step and protocol-specific detection methods to identify potential security threats | 85 |
| A framework for creating secure honeypot environments using AI and low-code development | 703 |
| A honeypot tool to detect and track network attacks by simulating a compromised system's interface | 2 |
| An intrusion detection system that mimics vulnerable services to attract and detect attackers | 21 |
| An HL7/FHIR honeypot that emulates malicious network activity to detect security threats | 24 |
| A proof-of-concept project demonstrating the use of GPT3.5 in creating an SMTP honeypot | 5 |
| A web application honeypot system to attract malicious traffic and detect potential security threats. | 450 |
| An open-source honeypot web application designed to detect and analyze malware, simulating a vulnerable target for attackers to engage with. | 14 |
| A honeypot server written in Go to detect and log malicious network activity. | 43 |
| Creates a fake file system using a large language model to mimic real-world file systems and lure attackers into thinking they have access to a legitimate system. | 5 |
| A honeypot project designed to detect and capture remote file inclusion (RFI) and local file inclusion (LFI) attacks by serving fake URLs that mimic vulnerable website paths. | 17 |
| A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks | 61 |
| Automated deception framework to detect and respond to cyber threats | 443 |
| A Python-based honeypot system mimicking a vulnerable WordPress installation to detect and analyze security threats | 6 |
| A honeypot system that detects and reports malicious network activity | 3 |