amun

Honeypot

A Python-based low-interaction honeypot designed to detect and analyze malicious network activity

Amun Honeypot

GitHub

59 stars
8 watching
25 forks
Language: Python
last commit: 6 months ago
Linked from 1 awesome list

amunhoneypotpython

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
naorlivne/dshp A simple honeypot system designed to detect and respond to unauthorized access attempts 16
qeeqbox/honeypots A comprehensive package of 30 different honeypots in Python that can monitor network traffic and detect malicious activities 693
omererdem/honeything A honeypot designed to emulate vulnerabilities in TR-069 protocol devices for security testing and research purposes. 121
ajackal/arctic-swallow A tool designed to detect and respond to low-interaction attacks by mimicking a vulnerable system 2
masood-m/yalih Detects malicious websites by collecting and analyzing suspicious URLs, scripts, and network traffic 69
0xballpoint/trapster-community A multi-service honeypot solution for real-time threat detection and network security monitoring 25
sahilm/hived A honeypot system that detects and reports malicious network activity 3
sjinks/mysql-honeypotd A low-interaction MySQL honeypot designed to detect and deter MySQL-related attacks. 32
cymmetria/mtpot A honeypot designed to detect and analyze network attacks by simulating vulnerable systems 104
canadianjeff/honeywrt An intrusion detection system that mimics vulnerable services to attract and detect attackers 21
mushorg/glutton A honeypot designed to attract and detect malicious network traffic 245
morian/blacknet A honeypot system designed to detect and log SSH attempts on multiple IP addresses. 21
mushorg/snare A web application honeypot system to attract malicious traffic and detect potential security threats. 447
betheroot/sticky_elephant A tool designed to detect and study PostgreSQL honeypot attacks 11
betheroot/pghoney A low-interaction Postgres honeypot designed to detect and respond to potential security threats by simulating a Postgres database 18