Delilah Honeypot Logo

Delilah Honeypot

0
Free
Updated 11 March 2025
Visit Website

Delilah is a honeypot system inspired by Jordan Wright’s Elastichoney that detects and identifies attack commands, recon attempts, and download commands. It acts as a vulnerable Elasticsearch instance that detects and identifies attack commands, recon attempts, and download commands. Whenever an attacker issues a download command, Delilah will attempt to download the file the attacker is attempting to introduce on a victim's system. Whenever Delilah detects an attacker's commands, a notification email is sent to one or more email addresses in order to alert analysts in real-time of incoming attacks. Delilah provides a variety of configurable parameters to mimic Elasticsearch instances and prevent an attacker from easily determining that they are interacting with a honeypot. Multiple Delilah nodes can be installed to form a network of sensors. To more easily view the sensor network, analysts should use the

FEATURES

SIMILAR TOOLS

A web honeypot tool for detecting and monitoring potential attacks on phpMyAdmin installations.

Galah is an LLM-powered web honeypot that mimics various web applications by dynamically responding to HTTP requests.

A tool to identify potential subdomain takeovers by checking if a CNAME record resolves to the scope address.

GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

SMTP Honeypot with custom modules for different modes of operation.

A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.

A security platform that automates the deployment and management of security canaries across cloud infrastructure to detect potential intrusions and unauthorized access.

Commercial

Automated script to install and deploy a honeypot with kippo, dionaea, and p0f on Ubuntu 12.04.

bap is a webservice honeypot that logs HTTP basic authentication credentials.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved