ssh-honeypotd

Honeypot

An SSH honeypot designed to detect and prevent unauthorized access attempts

A low-interaction SSH honeypot written in C

GitHub

15 stars
5 watching
4 forks
Language: C
last commit: 1 day ago
Linked from 1 awesome list

honeypotsecuritysshssh-honeypotssh-honeypotd

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
sjinks/mysql-honeypotd A low-interaction MySQL honeypot designed to detect and deter MySQL-related attacks. 32
sahilm/hived A honeypot system that detects and reports malicious network activity 3
jaksi/sshesame An SSH honeypot that logs activity without executing commands or making network requests 1,562
ashmckenzie/go-sshoney An SSH honeypot project designed to log and monitor unauthorized SSH connection attempts 32
fzerorubigd/go0r A simple SSH honeypot in Go to detect and prevent unauthorized access 35
victpork/sshsyrup An SSH honeypot solution that captures terminal activity and uploads to asciinema.org, allowing for analysis and storage of attacker interactions. 96
gfoss/phpmyadmin_honeypot A honeypot designed to detect and log attempts to access unauthorized phpMyAdmin functionality 66
droberson/ssh-honeypot A honeypot program that logs IP addresses, usernames, and passwords of incoming SSH connections. 631
paulmaddox/gohoney An SSH honeypot designed to detect and record brute-force login attempts by recording commands executed in a fake shell environment. 11
naorlivne/dshp A simple honeypot system to detect and respond to potential security threats. 16
morian/blacknet A honeypot system designed to detect and log SSH attempts on multiple IP addresses. 22
mdp/honeypot.go A tool to detect and track unauthorized SSH attempts on a public machine 28
desaster/kippo An SSH honeypot designed to detect brute force attacks and log attacker interactions 1,633
cryptix720/hudinx A honeypot designed to detect and log brute force SSH attacks by simulating a vulnerable system 6
czardoz/hornet A medium interaction SSH honeypot with sandboxed filesystems and cross-host interactions. 22