helix-honeypot
Honeypot
A Kubernetes API honeypot with Active Defense capabilities designed to detect and disrupt malicious activities
K8s API Honeypot with Active Defense Capabilities
39 stars
1 watching
4 forks
Language: Go
last commit: 11 months ago
Linked from 1 awesome list
givegoingnevertoupyou
Related projects:
Repository | Description | Stars |
---|---|---|
mushorg/snare | A web application honeypot system to attract malicious traffic and detect potential security threats. | 447 |
schmalle/medpot | An HL7/FHIR honeypot that emulates malicious network activity to detect security threats | 22 |
czardoz/hornet | A medium interaction SSH honeypot with sandboxed filesystems and cross-host interactions. | 22 |
naorlivne/dshp | A simple honeypot system designed to detect and respond to unauthorized access attempts | 16 |
revengecoming/demonhunter | A distributed honeypot system that mimics real-world servers to detect and prevent cyber attacks | 60 |
sahilm/hived | A honeypot system that detects and reports malicious network activity | 3 |
mushorg/glutton | A honeypot designed to attract and detect malicious network traffic | 245 |
ginger51011/pandoras_pot | An HTTP honeypot designed to mislead and slow down unwanted web crawlers while collecting data | 96 |
omererdem/honeything | A honeypot designed to emulate vulnerabilities in TR-069 protocol devices for security testing and research purposes. | 121 |
desaster/kippo | An SSH honeypot designed to detect brute force attacks and log attacker interactions | 1,623 |
bartnv/portlurker | A network honeypot that uses protocol guessing and safe string display to detect potential security threats. | 31 |
uhh-iss/honeygrove | A modular honeypot system that mimics industrial control systems to attract and analyze potential cyber threats. | 20 |
cymmetria/mtpot | A honeypot designed to detect and analyze network attacks by simulating vulnerable systems | 104 |
mojachieee/go-honeypot | A honeypot server written in Go to detect and log malicious network activity. | 44 |
mushorg/conpot | A tool to collect intelligence about attackers targeting industrial control systems by simulating vulnerabilities in ICS networks | 1,243 |