ofpot
IP redirecter
Detects unused IP addresses and redirects internet traffic to them using ARP spoofing.
OpenFlow Honeypot
23 stars
1 watching
2 forks
Language: Python
last commit: about 12 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
phype/telnet-iot-honeypot | Detects and analyzes Botnet connections to identify malware patterns and networks | 304 |
naorlivne/dshp | A simple honeypot system to detect and respond to potential security threats. | 16 |
cypwnpwnsocute/redishoneypot | A high-interaction honeypot solution for detecting Redis protocol exploitation | 22 |
0xballpoint/trapster-community | A multi-service honeypot solution for real-time threat detection and network security monitoring | 28 |
huuck/adbhoney | A honeypot designed to detect malware that exploits vulnerabilities in Android Debug Bridge protocols | 161 |
chadillac/upnproxypot | An SSDP and UPnP honeypot implementation to intercept and track UPnProxy campaigns | 36 |
jadb/honeypot | A PHP SDK for detecting and mitigating malicious traffic by identifying suspicious IP addresses and URLs. | 3 |
alexbredo/honeypot-ftp | A system to detect and analyze malicious activity on FTP connections. | 30 |
phin3has/mailoney | A honeypot solution that detects and logs suspicious SMTP traffic | 256 |
kryptoslogic/rdppot | A RDP honeypot system that mimics a vulnerable RDP endpoint to detect and analyze potential attacks. | 63 |
joda32/owa-honeypot | A basic honeypot system designed to detect and prevent Outlook Web Application (OWA) attacks | 66 |
qeeqbox/honeypots | A comprehensive package of 30 different honeypots in Python that can monitor network traffic and detect malicious activities | 704 |
zeroq/amun | A Python-based low-interaction honeypot designed to detect and analyze malicious network activity | 60 |
dmpayton/django-admin-honeypot | A fake admin login screen to log and notify admins of unauthorized access attempts | 1,031 |
cymmetria/mtpot | A honeypot designed to detect and analyze Mirai-type attacks by simulating a vulnerable network service. | 104 |