Delilah Honeypot Logo

Delilah Honeypot

0
Free
Visit Website

Delilah is a honeypot system inspired by Jordan Wright’s Elastichoney that detects and identifies attack commands, recon attempts, and download commands. It acts as a vulnerable Elasticsearch instance that detects and identifies attack commands, recon attempts, and download commands. Whenever an attacker issues a download command, Delilah will attempt to download the file the attacker is attempting to introduce on a victim's system. Whenever Delilah detects an attacker's commands, a notification email is sent to one or more email addresses in order to alert analysts in real-time of incoming attacks. Delilah provides a variety of configurable parameters to mimic Elasticsearch instances and prevent an attacker from easily determining that they are interacting with a honeypot. Multiple Delilah nodes can be installed to form a network of sensors. To more easily view the sensor network, analysts should use the

FEATURES

ALTERNATIVES

Tango is a set of scripts and Splunk apps for deploying honeypots with ease.

A web honeypot tool for detecting and monitoring potential attacks on phpMyAdmin installations.

Script for turning a Raspberry Pi into a Honey Pot Pi with various monitoring and logging capabilities.

OpenCanary is a multi-protocol network honeypot with low resource requirements and alerting capabilities.

Django App for the SSH Honeypot called 'kippo'

Helix is a versatile honeypot designed to mimic the behavior of various protocols including Kubernetes API server, HTTP, TCP, and UDP.

Docker-based honeypot setup with detailed installation and configuration instructions.

A Perl honeypot program for monitoring hostile traffic and wasting hackers' time.

PINNED