Home / Threat Defense / Honeypots

Honeypots

Discover honeypots for advanced threat defense and early detection of malicious activity.

Try these 162 AI Honeypots Tools

Manuka by Andew Michael Smith
Free

Manuka by Andew Michael Smith View Manuka by Andew Michael Smith

A project providing honeypots for embedded device vulnerabilities with support for AWS integration and JSON output.

Manuka by SpaceRaccoon
Free

Manuka by SpaceRaccoon View Manuka by SpaceRaccoon

A tool for testing subdomain takeover possibilities at a mass scale.

Medpot
Free

Medpot View Medpot

High-interaction SSH honeypot for logging SSH proxy with ongoing development.

mhn-core-docker
Free

mhn-core-docker View mhn-core-docker

A correlated injection proxy tool for XSS Hunter

MICROS Honeypot
Free

MICROS Honeypot View MICROS Honeypot

A security platform that automates the deployment and management of security canaries across cloud infrastructure to detect potential intrusions and unauthorized access.

Miniprint
Free

Miniprint View Miniprint

Docker-based honeypot setup with detailed installation and configuration instructions.

modpot
Free

modpot View modpot

RDP based Honeypot that creates virtual machines for incoming connections and analyzes traffic with Suricata.

Monkey-Spider
Free

Monkey-Spider View Monkey-Spider

WordPress honeypot tool running in a Docker container for monitoring access attempts.

MTPot
Free

MTPot View MTPot

SMTP honeypot tool with configurable response messages, email storage, and automatic information extraction.

mysql-honeypotd
Free

mysql-honeypotd View mysql-honeypotd

WordPress honeypot tool running in a Docker container for monitoring access attempts.

node-ftp-honeypot
Free

node-ftp-honeypot View node-ftp-honeypot

A simple Elasticsearch honeypot to catch attackers exploiting RCE vulnerabilities.

Nodepot
Free

Nodepot View Nodepot

A simple SSH honeypot written in Golang with a Persian-inspired name.

NoSQL-Honeypot-Framework (NoPo)
Free

NoSQL-Honeypot-Framework (NoPo) View NoSQL-Honeypot-Framework (NoPo)

A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.

OpenCanary
Free

OpenCanary View OpenCanary

A honeypot system that detects and identifies attack commands, recon attempts, and download commands, mimicking a vulnerable Elasticsearch instance.

OWA Honeypot
Free

OWA Honeypot View OWA Honeypot

A low interaction honeypot for detecting CVE-2018-0101 vulnerability in Cisco ASA component.

OWASP Honeypot
Free

OWASP Honeypot View OWASP Honeypot

Apache 2 based honeypot for detecting and blocking Struts CVE 2017-5638 exploit with added support for content disposition filename parsing vulnerability.

oxml_xxe
Free

oxml_xxe View oxml_xxe

A tool for generating permutations, alterations and mutations of subdomains and resolving them

Pasithea
Free

Pasithea View Pasithea

A low-interaction honeypot that logs IP addresses, usernames, and passwords used by clients connecting via SSH, primarily used for gathering intelligence on brute force attacks.

pghoney
Free

pghoney View pghoney

Honey-Pod for SSH that logs username and password tries during brute-force attacks.

phpMyAdmin Honeypot
Free

phpMyAdmin Honeypot View phpMyAdmin Honeypot

Script for turning a Raspberry Pi into a Honey Pot Pi with various monitoring and logging capabilities.

Project Artillery
Free

Project Artillery View Project Artillery

The DShield Raspberry Pi Sensor is a tool that turns a Raspberry Pi into a honeypot to collect and submit security logs to the DShield project for analysis.

rdppot
Free

rdppot View rdppot

A tool to identify potential subdomain takeovers by checking if a CNAME record resolves to the scope address.

RedisHoneyPot
Free

RedisHoneyPot View RedisHoneyPot

High-interaction SSH honeypot for logging SSH proxy with ongoing development.

SCADA HoneyNet Project
Free

SCADA HoneyNet Project View SCADA HoneyNet Project

A honeypot agent for running honeypots with service and data at threatwar.com.