BW-Pot (Breakable Web applications honeyPot) is a highly interactive honeypot targeting HTTP or HTTPS, observing access from attackers by building easily targeted and compromised web applications. It forwards logs to Google BigQuery for accumulation and visualization, features frequent attack target web app environment usage, daily automatic restoration to a clean environment, real-time log integration with Google BigQuery, automatic log rotation, and saving packet capture files for detailed analysis, operable on low-spec servers. Architecture/Specification: Refer to the architecture diagram and detailed specifications. Installation: Hardware Requirements: 2GB RAM, 10GB SSD, Internet Connection. Software Requirements: Docker, Docker-Compose, logrotate. Service Account Requirements: Google Cloud Platform Account. Usage: Analyze logs forwarded to BigQuery using SQL execution in BigQuery's WebUI, create dashboards specifying BigQuery tables as data sources in the data portal. Licenses: Apache License v2 for Docker, Fluentd, Apache Tomcat; GPL v2 for Wireshark (tshark), WordPress, phpMyAdmin; BSD License for WOWHoneypot. Author: graneed. ToDo: Add Drupal to web applications, store network capture files in /data/tshark/dump/ for download and inspection with WireShark, etc., for log preservation, consider Amazon S3.
FEATURES
SIMILAR TOOLS
An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.
A honeypot daemon project for processing, filtering, and redirecting incoming traffic to a sandbox environment.
A modified version of OpenSSH deamon forwarding commands to Cowrie for logging brute force attacks and shell interactions.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.