Beelzebub is an advanced honeypot framework designed to provide a highly secure environment for detecting and analyzing cyber attacks. It offers a low code approach for easy implementation and utilizes virtualization techniques powered by OpenAI Generative Pre-trained Transformer. OpenAI GPT Integration: Learn how to integrate Beelzebub with OpenAI GPT-3 by referring to our comprehensive guide on Medium: Medium Article Telegram Bot for Real-Time Attacks: Stay updated on real-time attacks by joining our dedicated Telegram channel: Telegram Channel Examples: To better understand the capabilities of Beelzebub, you can explore our example repository: mariocandela/beelzebub-example Quick Start: We provide two quick start options for build and run Beelzebub: using Docker Compose or the Go compiler. Using Docker Compose: Build the Docker images: $ docker-compose build Start Beelzebub in detached mode: $ docker-compose up -d Using Go Compiler: Download the necessary Go modules: $ go mod download Build the Beelzebub executable: $ go build Run Beelzebub: $ ./beelzebub Deploy on Kubernetes cluster using Helm: Install helm Deploy Beelzebub: $ helm install beelzebub ./beelzebub-char
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
A web-based visualization tool that displays statistics and generates charts from Shockpot honeypot data stored in PostgreSQL databases.
A plugin repository that extends the Honeycomb honeypot framework with additional features and capabilities for enhanced threat detection and analysis.
An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.
A low interaction client honeypot that detects malicious websites using signature, anomaly and pattern matching techniques with automated URL collection and JavaScript analysis capabilities.
A WordPress plugin that logs failed login attempts to help monitor unauthorized access attempts on WordPress websites.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.