Dicompot is a fully functional DICOM server with a twist, blocking C-STORE attempts for protection but logging them. It can be installed on Ubuntu 22.04 LTS or MacOS 13.5+ using golang and git, and also has Docker support. The server logs to the console and a file called dicompot.log (JSON), and works well with screen for background running. It has been tested with findscu, getscu, and Horos from the DICOM Toolkit - DCMTK.
FEATURES
SIMILAR TOOLS
A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server
A web-based visualization tool that displays statistics and generates charts from Shockpot honeypot data stored in PostgreSQL databases.
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
An Apache 2 based honeypot with detection capabilities specifically designed to identify and analyze Struts CVE-2017-5638 exploitation attempts.