helix-honeypot

Honeypot

A Kubernetes API honeypot with Active Defense capabilities designed to detect and disrupt malicious activities

K8s API Honeypot with Active Defense Capabilities

GitHub

39 stars
1 watching
4 forks
Language: Go
last commit: 11 months ago
Linked from 1 awesome list

givegoingnevertoupyou

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
mushorg/snare A web application honeypot system to attract malicious traffic and detect potential security threats. 447
schmalle/medpot An HL7/FHIR honeypot that emulates malicious network activity to detect security threats 22
czardoz/hornet A medium interaction SSH honeypot with sandboxed filesystems and cross-host interactions. 22
naorlivne/dshp A simple honeypot system designed to detect and respond to unauthorized access attempts 16
revengecoming/demonhunter A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks 60
sahilm/hived A honeypot system that detects and reports malicious network activity 3
mushorg/glutton A honeypot designed to attract and detect malicious network traffic 245
ginger51011/pandoras_pot An HTTP honeypot designed to mislead and slow down unwanted web crawlers while collecting data 96
omererdem/honeything A honeypot designed to emulate vulnerabilities in TR-069 protocol devices for security testing and research purposes. 121
desaster/kippo An SSH honeypot designed to detect brute force attacks and log attacker interactions 1,623
bartnv/portlurker A network honeypot that uses protocol guessing and safe string display to detect potential security threats. 31
uhh-iss/honeygrove A modular honeypot system that mimics industrial control systems to attract and analyze potential cyber threats. 20
cymmetria/mtpot A honeypot designed to detect and analyze network attacks by simulating vulnerable systems 104
mojachieee/go-honeypot A honeypot server written in Go to detect and log malicious network activity. 44
mushorg/conpot A tool to collect intelligence about attackers targeting industrial control systems by simulating vulnerabilities in ICS networks 1,243