opencanary
Honeypot
A network honeypot that catches hackers after they breach non-public networks, sending alerts via various mechanisms.
Modular and decentralised honeypot
2k stars
75 watching
366 forks
Language: Python
last commit: 12 months ago
Linked from 1 awesome list
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A comprehensive honeypot platform with visualization options and security tools to simulate network attacks and improve deception experience. | 6,943 |
| | A centralized server for managing and collecting data from honeypots. | 2,441 |
| | An interactive application firewall that allows users to filter and manage network connections on GNU/Linux systems. | 11,023 |
| | A comprehensive security scanner that identifies vulnerabilities and misconfigurations in various targets such as containers, code repositories, and infrastructure | 24,010 |
| | A comprehensive package of 30 different honeypots in Python that can monitor network traffic and detect malicious activities | 704 |
| | A lightweight mobile-friendly UI for managing Docker Swarm clusters | 3,135 |
| | An open source platform for building and deploying serverless cloud applications using functions as a service | 6,575 |
| | A secure tunneling daemon that creates encrypted connections between two endpoints over the internet. | 11,131 |
| | A Zero Trust protocol that leverages resource-hiding and encryption to safeguard servers and data from attackers | 13,520 |
| | A comprehensive collection of hacking tools and scripts for penetration testing and vulnerability assessment | 10,698 |
| | Detects Remote Code Execution vulnerability in Oracle WebLogic Server component | 32 |
| | Tools and middleware for smart card applications and security | 2,604 |
| | A PHP-based e-commerce platform providing a professional and reliable foundation for building an online store. | 7,519 |
| | A Docker-based honeypot setup script to simulate network attacks and detect malware | 24 |
| | A Docker-based honeypot system for detecting and analyzing network attacks | 148 |