Manuka by Andew Michael Smith
A project providing honeypots for embedded device vulnerabilities with support for AWS integration and JSON output.
Discover honeypots for advanced threat defense and early detection of malicious activity.
A project providing honeypots for embedded device vulnerabilities with support for AWS integration and JSON output.
A tool for testing subdomain takeover possibilities at a mass scale.
A security platform that automates the deployment and management of security canaries across cloud infrastructure to detect potential intrusions and unauthorized access.
Docker-based honeypot setup with detailed installation and configuration instructions.
RDP based Honeypot that creates virtual machines for incoming connections and analyzes traffic with Suricata.
WordPress honeypot tool running in a Docker container for monitoring access attempts.
SMTP honeypot tool with configurable response messages, email storage, and automatic information extraction.
WordPress honeypot tool running in a Docker container for monitoring access attempts.
A simple Elasticsearch honeypot to catch attackers exploiting RCE vulnerabilities.
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
A honeypot system that detects and identifies attack commands, recon attempts, and download commands, mimicking a vulnerable Elasticsearch instance.
A low interaction honeypot for detecting CVE-2018-0101 vulnerability in Cisco ASA component.
Apache 2 based honeypot for detecting and blocking Struts CVE 2017-5638 exploit with added support for content disposition filename parsing vulnerability.
A tool for generating permutations, alterations and mutations of subdomains and resolving them
A low-interaction honeypot that logs IP addresses, usernames, and passwords used by clients connecting via SSH, primarily used for gathering intelligence on brute force attacks.
Honey-Pod for SSH that logs username and password tries during brute-force attacks.
Script for turning a Raspberry Pi into a Honey Pot Pi with various monitoring and logging capabilities.
The DShield Raspberry Pi Sensor is a tool that turns a Raspberry Pi into a honeypot to collect and submit security logs to the DShield project for analysis.
A tool to identify potential subdomain takeovers by checking if a CNAME record resolves to the scope address.
High-interaction SSH honeypot for logging SSH proxy with ongoing development.
A honeypot agent for running honeypots with service and data at threatwar.com.