MysqlPot
Honeypot
A MySQL honeypot designed to detect and prevent unauthorized access attempts
A mysql honeypot, still very very early stage
21 stars
5 watching
2 forks
Language: C#
last commit: about 12 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
schmalle/servletpot | An open-source honeypot web application designed to detect and analyze malware, simulating a vulnerable target for attackers to engage with. | 14 |
schmalle/medpot | An HL7/FHIR honeypot that emulates malicious network activity to detect security threats | 24 |
sjinks/mysql-honeypotd | A low-interaction MySQL honeypot designed to detect and deter MySQL-related attacks. | 32 |
schmalle/nodepot | A small-scale NodeJS honeypot application designed to detect malicious activity | 45 |
gfoss/phpmyadmin_honeypot | A honeypot designed to detect and log attempts to access unauthorized phpMyAdmin functionality | 66 |
naorlivne/dshp | A honeypot designed to detect and respond to unauthorized access attempts with customizable alerts and automated responses. | 16 |
mushorg/snare | A web application honeypot system to attract malicious traffic and detect potential security threats. | 448 |
sjinks/ssh-honeypotd | An SSH honeypot designed to detect and prevent unauthorized access attempts | 15 |
marist-innovation-lab/doloshoneypot | A honeypot tool to detect and track network attacks by simulating a compromised system's interface | 2 |
mrcbax/honeyup | An uploader honeypot designed to mimic poor website security | 26 |
schmalle/honeyalarmg2 | A simplified UI tool for displaying honeypot alarm notifications | 4 |
rosehgal/honeysmb | A honeypot solution that detects and analyzes SMB protocol interactions to identify potential security threats. | 46 |
betheroot/sticky_elephant | A tool designed to detect and study PostgreSQL honeypot attacks | 11 |
mojachieee/go-honeypot | A honeypot server written in Go to detect and log malicious network activity. | 43 |
batchmcnulty/malbait | A honeypot program designed to waste the time of hackers by simulating vulnerable servers and recording hostile traffic. | 8 |