 Honeyport
 Honeyport 
 Honeyport detector
 A security tool that detects and blocks malicious connections to identify targeted attackers
Bash and Python Honeyport scripts
43 stars
 4 watching
 7 forks
 
Language: Shell 
last commit: over 8 years ago 
Linked from   1 awesome list  
 Related projects:
| Repository | Description | Stars | 
|---|---|---|
|  | A honeypot solution to detect port scanning on networks by imitating common ports and logging suspicious activity. | 7 | 
|  | A tool used to detect and analyze malicious shellcode in web pages | 25 | 
|  | A tool to detect and track unauthorized SSH attempts on a public machine | 28 | 
|  | A signature-based honeypot detection tool that uses multi-step and protocol-specific detection methods to identify potential security threats | 85 | 
|  | A middleware that inserts a trap into responses to detect and prevent spam bot attempts. | 23 | 
|  | A honeypot system that detects and reports malicious network activity | 3 | 
|  | A simple honeypot system to detect and respond to potential security threats. | 16 | 
|  | A PHP SDK for detecting and mitigating malicious traffic by identifying suspicious IP addresses and URLs. | 3 | 
|  | A simple serverless application designed to create and monitor fake HTTP endpoints for security testing | 511 | 
|  | A network honeypot that uses protocol guessing and safe string display to detect potential security threats. | 31 | 
|  | A tool designed to detect and collect sensitive information from malicious users by mimicking popular network services | 377 | 
|  | A system for running and managing honeypots to detect and monitor malicious activity in computer networks. | 1,226 | 
|  | A simple honeypot system designed to detect port monitoring attacks by analyzing network traffic and triggering notifications when potential threats are detected. | 17 | 
|  | A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks | 61 | 
|  | A honeypot solution that detects and analyzes SMB protocol interactions to identify potential security threats. | 47 |