bap is a webservice honeypot that logs HTTP basic authentication credentials in a 'parser friendly format'. The webservice responds with 401 WWW-Authenticate: Basic realm='ADMIN' for HEAD and GET requests, and generates an error response for other HTTP methods. No valid username/password exists, only credentials are logged. Configuration involves setting HTTP_ADDR and HTTP_PORT in bap.py, with default binding to *:8080. Running bap.py starts the service, while start-bap-debian.sh and stop-bap-debian.sh manage background execution. Logging occurs in pot.log in the same directory as bap.py, with entries in the format: [Date Time] Client_address:Client_port Auth_method Decoded_auth_string.
FEATURES
SIMILAR TOOLS
A low interaction client honeypot that detects malicious websites using signature, anomaly and pattern matching techniques with automated URL collection and JavaScript analysis capabilities.
An Apache 2 based honeypot with detection capabilities specifically designed to identify and analyze Struts CVE-2017-5638 exploitation attempts.
A plugin repository that extends the Honeycomb honeypot framework with additional features and capabilities for enhanced threat detection and analysis.
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.