Showing 63 open source projects for "honeypot"

View related business solutions
  • Auth0 for AI Agents now in GA Icon
    Auth0 for AI Agents now in GA

    Ready to implement AI with confidence (without sacrificing security)?

    Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
    Start building today
  • D&B Hoovers is Your Sales Accelerator Icon
    D&B Hoovers is Your Sales Accelerator

    For sales teams that want to accelerate B2B sales with better data

    Speed up sales prospecting with the rich audience targeting capabilities of D&B Hoovers so you can spend more sales time closing.
    Learn More
  • 1
    Laravel Honeypot

    Laravel Honeypot

    Preventing spam submitted through forms

    ...Luckily, the majority of these bots are pretty dumb. You can thwart most of them by adding an invisible field to your form that should never contain a value when submitted. Such a field is called a honeypot. These spam bots will just fill all fields, including the honeypot. When a submission comes in with a filled honeypot field, this package will discard that request. On top of that this package also checks how long it took to submit the form. This is done using a timestamp in another invisible field. If the form was submitted in a ridiculously short time, the anti-spam will also be triggered.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    ContainerSSH

    ContainerSSH

    ContainerSSH: Launch containers on demand

    An SSH Server that Launches Containers in Kubernetes and Docker. Building a lab environment can be time-consuming. ContainerSSH solves this by providing dynamic SSH access with APIs, automatic cleanup on logout using ephemeral containers, and persistent volumes for storing data. Perfect for vendor and student labs. Provide production access to your developers, give them their usual tools while logging all changes. Authorize their access and create short-lived credentials for the database...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Maltrail

    Maltrail

    Malicious traffic detection system

    ...Sensor(s) is a standalone component running on the monitoring node (e.g. Linux platform connected passively to the SPAN/mirroring port or transparently inline on a Linux bridge) or at the standalone machine (e.g. Honeypot) where it "monitors" the passing Traffic for blacklisted items/trails (i.e. domain names, URLs and/or IPs).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    endlessh-go

    endlessh-go

    A golang implementation of endlessh exporting Prometheus metrics

    Endlessh is a great idea that not only blocks the brute force SSH attacks, but also wastes attackers time as a kind of counter-attack. Besides trapping the attackers, I also want to visualize the Geolocations and other statistics of the sources of attacks. Unfortunately the wonderful original C implementation of endlessh only provides text based log, but I do not like the solution that writes extra scripts to parse the log outputs, then exports the results to a dashboard, because it would...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
    Learn More
  • 5
    SSH-MITM

    SSH-MITM

    Server for security audits supporting public key authentication

    ...When publickey authentication is possible, a forwarded agent is needed to login to the remote server. In cases, when no agent was forwarded, SSH-MITM can rediredt the session to a honeypot.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    GenAIPot

    GenAIPot is the first A.I honeypot that emulates services and using Generative AI to do that in order to be more stealth.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Valhala Honeypot is an easy to use honeypot for the Windows System. The software have the following services: http (web), ftp, tftp, finger, pop3, smtp, echo, daytime, telnet and port forwarding. Some services are real, others are a simulation.
    Leader badge
    Downloads: 44 This Week
    Last Update:
    See Project
  • 8
    WebSploit Framework

    WebSploit Framework

    WebSploit is a high level MITM Framework

    WebSploit Advanced MITM Framework [+]Autopwn - Used From Metasploit For Scan and Exploit Target Service [+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin [+]format infector - inject reverse & bind payload into file format [+]phpmyadmin Scanner [+]CloudFlare resolver [+]LFI Bypasser [+]Apache Users Scanner [+]Dir Bruter [+]admin finder [+]MLITM Attack - Man Left In The Middle, XSS Phishing Attacks [+]MITM - Man In The Middle Attack [+]Java Applet Attack [+]MFOD Attack Vector [+]ARP Dos Attack [+]Web Killer Attack [+]Fake Update Attack [+]Fake Access point Attack [+]Wifi Honeypot [+]Wifi Jammer [+]Wifi Dos [+]Wifi Mass De-Authentication Attack [+]Bluetooth POD Attack Project In Github : https://github.com/websploit
    Downloads: 13 This Week
    Last Update:
    See Project
  • 9

    voidd

    honeypot listener to feed block lists or what have you

    Listens for connections on ports and executes a script when a connection is made. Useful for populating packet filter tables with ip's from bots/scanners.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 10

    PotHead

    PotHead

    PotHead What is it? Pothead: A simple lightweight packet for creating a minimal interaction honeypot How does it work? Magic, Well kinda you don’t need super dupper knowledge to use this! Oops the magic failed ;) a really nice INSTALL.md will be written unfortunately it’s not yet available. 1) Download all the files 2) Check if you got everything 3) Upload and configure the Website and backend (includes/Config.php & the .SQL files) 4) Do not forget to change your APIKEY! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Honeeepi

    Honeypot sensor on Raspberry Pi

    This project is about building honeypots with Raspberry Pi - a credit card sized ARM Linux box. Honeeepi is a honeypot sensor on Raspberry Pi which based on customized Raspbian OS. It was pre-installed with multiple updated honeypot packages and network monitoring tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Project:Ares Honeypot

    Honeypot system created in PHP

    Project:Ares is offensive/defensive projects Part of Project:Ares, Honeypot is part of the project, first to be open sourced. It is released as GPLv3.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Bifrozt

    Bifrozt

    High interaction honeypot solution for Linux based systems

    NOTICE: The format of this project has been changed from ISO to using ansible and has been moved to GitHub. Github link: https://github.com/Bifrozt/bifrozt-ansible
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    HoneyMagic

    Heterogeneous Honeypot System

    The design of A flexible and adaptive solution for the management of heterogeneous honeypot system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Xortify

    Xortify

    Honeypot that acts as a Sentry on PHP Websites

    Honeypot that acts as a Sentry on PHP Websites
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    sendmespamids
    SendMeSpamIDS is a python written honeypot. It includes HTTP, HTTPS, SMTP and many more, which are under constant development. The scripts support syslog and are ready for ELK integration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    VoIP Honey project provides a set of tools for building an entire honeynet, thus includes honeywall and honeypot emulating VoIP environments such as Asterisk PBX or OpenSer with fully configurable connections. Voip Honey runs on GNU/Linux and Windows Systems. It can be compiled for Mac OSX as well.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Honey-p - является простым клоном программ типа "HoneyPot". Прост в развертывании и использовании. Все подробности в файле readme.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Raspberry Pi based Honeypots

    Raspbian with pre-installed kippo, dionaea and glastopf honeypots

    Setting up honeypots like glastopf can be tedious and time taking. Pi-pots are pre-loaded raspberry pi images and contain various honeypot clients (like kippo, dionaea and glastopf) and other softwares needed to run a honeypot sensor. A user may simply download these raspbian distributions and write it to the memory card. They can then setup a sensor in no time. Different versions of pi-pots bundle different software required by a sensor. Users are encouraged to go through the readme file for each version to best meet their requirements.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    HoneyDrive

    HoneyDrive

    Honeypots in a box! HoneyDrive is the premier honeypot bundle distro.

    HoneyDrive is the premier honeypot Linux distro. It is a virtual appliance (OVA) with Xubuntu Desktop 12.04.4 LTS edition installed. It contains over 10 pre-installed and pre-configured honeypot software packages such as Kippo SSH honeypot, Dionaea and Amun malware honeypots, Honeyd low-interaction honeypot, Glastopf web honeypot and Wordpot, Conpot SCADA/ICS honeypot, Thug and PhoneyC honeyclients and more.
    Leader badge
    Downloads: 11 This Week
    Last Update:
    See Project
  • 21
    Kippo-Graph

    Kippo-Graph

    Full featured script to visualize statistics from a Kippo SSH honeypot

    Kippo-Graph is a full featured script to visualize statistics from a Kippo SSH honeypot. It uses “Libchart” PHP chart drawing library by Jean-Marc Trémeaux, “QGoogleVisualizationAPI” PHP Wrapper for Google’s Visualization API by Thomas Schäfer and geoPlugin geolocation technology (geoplugin.com). Kippo-Graph currently shows 24 charts, including top 10 passwords, top 10 usernames, top 10 username/password combos, success ratio, connections per IP, connections per country, probes per day, probes per week, ssh clients, top 10 overall input, top 10 successful input, top 10 failed input and many more. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Amun is a low-interaction honeypot, like Nepenthes or Omnivora, designed to capture autonomous spreading malware in an automated fashion. Amun is written in Python and therefore allows easy integration of new features.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Artemisa
    Artemisa is a honeypot for VoIP (SIP) networks. It is designed to connect to a VoIP domain as a user-agent backend in order to detect malicious activity at an early stage and also adjust the policies of the enterprise in real-time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    HoneyLIP

    HoneyLIP is a server low interaction honeypot

    HoneyLIP emulates services like HTTP, IRC, SMTP and FTP on a network and logs all the information it finds about the incoming connection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    romanHunter

    romanHunter

    ROuter MAN HUNTER detects wireless attackers and captures their MAC

    romanHunter (router man Hunter) is a wireless honeypot or closer to a sinkhole that will bait a cracker, capture the MAC address, reset the WIFI password (effectively destroying their connection) and wait for the next authorized connection. The password changes happen on a round robin basis from entries in the password file (pw_list.txt).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next