Dionaea is a honeypot designed to catch bugs, utilizing Python as a scripting language, incorporating libemu for shellcode detection, and supporting various protocols such as FTP, HTTP, SMB, and more. It offers logging capabilities, integration with fail2ban and hpfeeds, and is licensed under GPLv2+ with some components under different licenses.
FEATURES
SIMILAR TOOLS
A honeypot tool to detect and log CVE-2019-19781 scan and exploitation attempts.
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.
A web-based visualization tool that displays statistics and generates charts from Shockpot honeypot data stored in PostgreSQL databases.
A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.