Delilah Honeypot Logo

Delilah Honeypot

0
Free
Visit Website

Delilah is a honeypot system inspired by Jordan Wright’s Elastichoney that detects and identifies attack commands, recon attempts, and download commands. It acts as a vulnerable Elasticsearch instance that detects and identifies attack commands, recon attempts, and download commands. Whenever an attacker issues a download command, Delilah will attempt to download the file the attacker is attempting to introduce on a victim's system. Whenever Delilah detects an attacker's commands, a notification email is sent to one or more email addresses in order to alert analysts in real-time of incoming attacks. Delilah provides a variety of configurable parameters to mimic Elasticsearch instances and prevent an attacker from easily determining that they are interacting with a honeypot. Multiple Delilah nodes can be installed to form a network of sensors. To more easily view the sensor network, analysts should use the

FEATURES

ALTERNATIVES

A low-interaction honeypot that logs IP addresses, usernames, and passwords used by clients connecting via SSH, primarily used for gathering intelligence on brute force attacks.

An Open-source intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue Teamers.

bap is a webservice honeypot that logs HTTP basic authentication credentials.

A tool to identify potential subdomain takeovers by checking if a CNAME record resolves to the scope address.

A honeypot tool that simulates an open relay to capture and analyze spam

A tool for bruteforcing subdomains of a given domain

A modular web application honeypot framework with automation and logging capabilities.

Honeypot tool with bug-catching capabilities and support for multiple protocols.