AMT Honeypot Logo

AMT Honeypot

0
Free
Updated 11 March 2025
Visit Website

A honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689. It replicates the behavior of Intel's AMT management service and serves content pulled from a HP machine to an attacker if successfully exploited. It can be built using the command `go build` and run using the command `./amthoneypot [logfile.txt]`. It also supports persistent execution using the command `nohup ./amthoneypot logfile.txt &`. Additionally, it lacks templating to make content dynamic/random and error checking. This tool is useful for detecting and preventing attacks on Intel's AMT firmware vulnerability CVE-2017-5689.

FEATURES

SIMILAR TOOLS

A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server

An observation camera honeypot for proof-of-concept purposes

SHIVA: Spam Honeypot with Intelligent Virtual Analyzer for capturing and analyzing spam data.

A honeypot tool with RDP and VNC feed support.

Create and monitor fake HTTP endpoints automatically with Honeyku, deployable on Heroku or your own server.

Blacknet is a low interaction SSH multi-head honeypot system with logging capabilities.

Low interaction MySQL honeypot with various configuration options.

A tool for exploiting SSRF and gaining RCE in various servers

A powerful tool for finding and exploiting subdomain takeover vulnerabilities

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved