Dionaea is a honeypot designed to catch bugs, utilizing Python as a scripting language, incorporating libemu for shellcode detection, and supporting various protocols such as FTP, HTTP, SMB, and more. It offers logging capabilities, integration with fail2ban and hpfeeds, and is licensed under GPLv2+ with some components under different licenses.
FEATURES
SIMILAR TOOLS
A plugin repository that extends the Honeycomb honeypot framework with additional features and capabilities for enhanced threat detection and analysis.
An Apache 2 based honeypot with detection capabilities specifically designed to identify and analyze Struts CVE-2017-5638 exploitation attempts.
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
A WordPress plugin that logs failed login attempts to help monitor unauthorized access attempts on WordPress websites.
A Docker-based honeypot network implementation featuring cowrie and dionaea honeypots with centralized event collection, geolocation enrichment, and real-time attack visualization.
An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.
A low interaction client honeypot that detects malicious websites using signature, anomaly and pattern matching techniques with automated URL collection and JavaScript analysis capabilities.