Home / Threat Defense / Honeypots

Honeypots

Discover honeypots for advanced threat defense and early detection of malicious activity.

Try these 162 AI Honeypots Tools

Manuka by Andew Michael Smith
Free

Manuka by Andew Michael Smith

A project providing honeypots for embedded device vulnerabilities with support for AWS integration and JSON output.

Manuka by SpaceRaccoon
Free

Manuka by SpaceRaccoon

A tool for testing subdomain takeover possibilities at a mass scale.

Medpot
Free

Medpot

High-interaction SSH honeypot for logging SSH proxy with ongoing development.

mhn-core-docker
Free

mhn-core-docker

A correlated injection proxy tool for XSS Hunter

MICROS Honeypot
Free

MICROS Honeypot

A security platform that automates the deployment and management of security canaries across cloud infrastructure to detect potential intrusions and unauthorized access.

Miniprint
Free

Miniprint

Docker-based honeypot setup with detailed installation and configuration instructions.

modpot
Free

modpot

RDP based Honeypot that creates virtual machines for incoming connections and analyzes traffic with Suricata.

Monkey-Spider
Free

Monkey-Spider

WordPress honeypot tool running in a Docker container for monitoring access attempts.

MTPot
Free

MTPot

SMTP honeypot tool with configurable response messages, email storage, and automatic information extraction.

mysql-honeypotd
Free

mysql-honeypotd

WordPress honeypot tool running in a Docker container for monitoring access attempts.

node-ftp-honeypot
Free

node-ftp-honeypot

A simple Elasticsearch honeypot to catch attackers exploiting RCE vulnerabilities.

Nodepot
Free

Nodepot

A simple SSH honeypot written in Golang with a Persian-inspired name.

NoSQL-Honeypot-Framework (NoPo)
Free

NoSQL-Honeypot-Framework (NoPo)

A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.

OpenCanary
Free

OpenCanary

A honeypot system that detects and identifies attack commands, recon attempts, and download commands, mimicking a vulnerable Elasticsearch instance.

OWA Honeypot
Free

OWA Honeypot

A low interaction honeypot for detecting CVE-2018-0101 vulnerability in Cisco ASA component.

OWASP Honeypot
Free

OWASP Honeypot

Apache 2 based honeypot for detecting and blocking Struts CVE 2017-5638 exploit with added support for content disposition filename parsing vulnerability.

oxml_xxe
Free

oxml_xxe

A tool for generating permutations, alterations and mutations of subdomains and resolving them

Pasithea
Free

Pasithea

A low-interaction honeypot that logs IP addresses, usernames, and passwords used by clients connecting via SSH, primarily used for gathering intelligence on brute force attacks.

pghoney
Free

pghoney

Honey-Pod for SSH that logs username and password tries during brute-force attacks.

phpMyAdmin Honeypot
Free

phpMyAdmin Honeypot

Script for turning a Raspberry Pi into a Honey Pot Pi with various monitoring and logging capabilities.

Project Artillery
Free

Project Artillery

The DShield Raspberry Pi Sensor is a tool that turns a Raspberry Pi into a honeypot to collect and submit security logs to the DShield project for analysis.

rdppot
Free

rdppot

A tool to identify potential subdomain takeovers by checking if a CNAME record resolves to the scope address.

RedisHoneyPot
Free

RedisHoneyPot

High-interaction SSH honeypot for logging SSH proxy with ongoing development.

SCADA HoneyNet Project
Free

SCADA HoneyNet Project

A honeypot agent for running honeypots with service and data at threatwar.com.