AMT Honeypot Logo

AMT Honeypot

0
Free
Visit Website

A honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689. It replicates the behavior of Intel's AMT management service and serves content pulled from a HP machine to an attacker if successfully exploited. It can be built using the command `go build` and run using the command `./amthoneypot [logfile.txt]`. It also supports persistent execution using the command `nohup ./amthoneypot logfile.txt &`. Additionally, it lacks templating to make content dynamic/random and error checking. This tool is useful for detecting and preventing attacks on Intel's AMT firmware vulnerability CVE-2017-5689.

FEATURES

ALTERNATIVES

SSH honeypot with rich features for recording and analyzing malicious activities.

An automation framework for subdomain bruteforcing

Galah is an LLM-powered web honeypot that mimics various web applications by dynamically responding to HTTP requests.

Beelzebub is an advanced honeypot framework for detecting and analyzing cyber attacks, with integration options for OpenAI GPT-3 and deployment on Kubernetes using Helm.

Honeypot platform for tracking and monitoring UDP-based DDoS attacks with support for various honeypot services.

A medium interaction printer honeypot that simulates a standard networked printer

Troje is a honeypot that creates a realistic environment within lxc containers to monitor and record traffic and changes to drives.

HoneyThing is a honeypot for Internet of TR-069 things, emulating vulnerabilities and supporting TR-069 protocol.