Delilah Honeypot Logo

Delilah Honeypot

0
Free
Visit Website

Delilah is a honeypot system inspired by Jordan Wright’s Elastichoney that detects and identifies attack commands, recon attempts, and download commands. It acts as a vulnerable Elasticsearch instance that detects and identifies attack commands, recon attempts, and download commands. Whenever an attacker issues a download command, Delilah will attempt to download the file the attacker is attempting to introduce on a victim's system. Whenever Delilah detects an attacker's commands, a notification email is sent to one or more email addresses in order to alert analysts in real-time of incoming attacks. Delilah provides a variety of configurable parameters to mimic Elasticsearch instances and prevent an attacker from easily determining that they are interacting with a honeypot. Multiple Delilah nodes can be installed to form a network of sensors. To more easily view the sensor network, analysts should use the

FEATURES

ALTERNATIVES

A configurable DNS honeypot with SQLite logging and Docker support.

WordPress honeypot tool running in a Docker container for monitoring access attempts.

A basic Flask-based Outlook Web App (OWA) honeypot for cybersecurity experimentation.

A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.

A simplified UI for showing honeypot alarms for the DTAG early warning system

Honeypot platform for tracking and monitoring UDP-based DDoS attacks with support for various honeypot services.

A tool to declutter URL lists for crawling and pentesting

Honeytrap is a low-interaction honeypot and network security tool with various modes of operation and plugin support for catching attacks against TCP and UDP services.