HellPot
Honeypot
An endless honeypot designed to punish unruly HTTP bots by simulating a website and sending them a never-ending stream of data.
HellPot is a cross-platform portal to endless suffering meant to punish unruly HTTP bots.
898 stars
7 watching
38 forks
Language: Go
last commit: 11 months ago
Linked from 1 awesome list
cross-platformdeceptionfasthttpfloodheffalumphoneypothttpmarkov-chainspamstresswebweb-server
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | An HTTP honeypot designed to mislead and slow down unwanted web crawlers while collecting data | 101 |
| | A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks | 61 |
| | A honeypot system designed to detect and log SSH attempts on multiple IP addresses. | 22 |
| | A modular honeypot system that mimics industrial control systems to attract and analyze potential cyber threats. | 20 |
| | A honeypot system that detects and reports malicious network activity | 3 |
| | A honeypot designed to detect and study malicious activity via SSH and TELNET connections | 9 |
| | An open-source honeypot web application designed to detect and analyze malware, simulating a vulnerable target for attackers to engage with. | 14 |
| | A honeypot program designed to waste the time of hackers by simulating vulnerable servers and recording hostile traffic. | 8 |
| | A tool to detect and analyze malicious network connections by simulating well-known services | 94 |
| | A honeypot system that simulates a Telnet service to detect and study botnet attacks | 161 |
| | A network honeypot that uses protocol guessing and safe string display to detect potential security threats. | 31 |
| | A simple honeypot system to detect and respond to potential security threats. | 16 |
| | An SSH honeypot that logs activity without executing commands or making network requests | 1,562 |
| | A network-based system for detecting and mitigating malicious activity | 13 |
| | An application that mimics Tomcat manager endpoints to detect and log potential attacks | 11 |