Dicompot is a fully functional DICOM server with a twist, blocking C-STORE attempts for protection but logging them. It can be installed on Ubuntu 22.04 LTS or MacOS 13.5+ using golang and git, and also has Docker support. The server logs to the console and a file called dicompot.log (JSON), and works well with screen for background running. It has been tested with findscu, getscu, and Horos from the DICOM Toolkit - DCMTK.
FEATURES
SIMILAR TOOLS
A Docker-based honeypot network implementation featuring cowrie and dionaea honeypots with centralized event collection, geolocation enrichment, and real-time attack visualization.
An Apache 2 based honeypot with detection capabilities specifically designed to identify and analyze Struts CVE-2017-5638 exploitation attempts.
An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.
A honeypot tool to detect and log CVE-2019-19781 scan and exploitation attempts.
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
A WordPress plugin that logs failed login attempts to help monitor unauthorized access attempts on WordPress websites.
A low interaction client honeypot that detects malicious websites using signature, anomaly and pattern matching techniques with automated URL collection and JavaScript analysis capabilities.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.