Honeyku
Create and monitor fake HTTP endpoints automatically with Honeyku, deployable on Heroku or your own server.
Delilah is a honeypot system inspired by Jordan Wright’s Elastichoney that detects and identifies attack commands, recon attempts, and download commands. It acts as a vulnerable Elasticsearch instance that detects and identifies attack commands, recon attempts, and download commands. Whenever an attacker issues a download command, Delilah will attempt to download the file the attacker is attempting to introduce on a victim's system. Whenever Delilah detects an attacker's commands, a notification email is sent to one or more email addresses in order to alert analysts in real-time of incoming attacks. Delilah provides a variety of configurable parameters to mimic Elasticsearch instances and prevent an attacker from easily determining that they are interacting with a honeypot. Multiple Delilah nodes can be installed to form a network of sensors. To more easily view the sensor network, analysts should use the
Create and monitor fake HTTP endpoints automatically with Honeyku, deployable on Heroku or your own server.
A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server
Honey-Pod for SSH that logs username and password tries during brute-force attacks.
A Go-based honeypot server for detecting and logging attacker activity
Hived is a honeypot tool for deceiving attackers and gathering information.
A tool to declutter URL lists for crawling and pentesting