ofpot
IP redirecter
Detects unused IP addresses and redirects internet traffic to them using ARP spoofing.
OpenFlow Honeypot
23 stars
1 watching
2 forks
Language: Python
last commit: almost 12 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
phype/telnet-iot-honeypot | Detects and analyzes Botnet connections to identify malware patterns and networks | 305 |
naorlivne/dshp | A simple honeypot system designed to detect and respond to unauthorized access attempts | 16 |
cypwnpwnsocute/redishoneypot | A high-interaction honeypot solution for detecting Redis protocol exploitation | 20 |
0xballpoint/trapster-community | A multi-service honeypot solution for real-time threat detection and network security monitoring | 28 |
huuck/adbhoney | A honeypot designed to detect malware that exploits vulnerabilities in Android Debug Bridge protocols | 160 |
chadillac/upnproxypot | An SSDP and UPnP honeypot implementation to intercept and track UPnProxy campaigns | 36 |
jadb/honeypot | A PHP SDK for detecting and mitigating malicious traffic by identifying suspicious IP addresses and URLs. | 3 |
alexbredo/honeypot-ftp | A system to detect and analyze malicious activity on FTP connections. | 28 |
phin3has/mailoney | A honeypot solution that detects and logs suspicious SMTP traffic | 254 |
kryptoslogic/rdppot | A RDP honeypot system that mimics a vulnerable RDP endpoint to detect and analyze potential attacks. | 62 |
joda32/owa-honeypot | A basic honeypot system designed to detect and prevent Outlook Web Application (OWA) attacks | 65 |
qeeqbox/honeypots | A comprehensive package of 30 different honeypots in Python that can monitor network traffic and detect malicious activities | 693 |
zeroq/amun | A Python-based low-interaction honeypot designed to detect and analyze malicious network activity | 59 |
dmpayton/django-admin-honeypot | A fake admin login screen to log and notify admins of unauthorized access attempts | 1,026 |
cymmetria/mtpot | A honeypot designed to detect and analyze network attacks by simulating vulnerable systems | 104 |