DionaeaFR is a low-interaction honeypot that uses Dionaea as its core. It provides a simple and easy-to-use interface for setting up and managing honeypots. It uses Python 2.7.3, Django 1.4, Jquery 1.7.2, Bootstrap Framework 2.1.1, jVectorMap 1.0, Kendo-UI v2011.3.1129, and SQLite3. It also requires pip install Django, pip install pygeoip, pip install django-pagination, pip install django-tables2, pip install django-compressor, pip install django-htmlmin, and pip install django-filter. Additionally, it requires django-tables2-simplefilter, SubnetTree, and nodejs. It also requires GeoIP and GeoLiteCity, which can be downloaded from geolite.maxmind.com.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.
An open-source Python software for creating honeypots and honeynets securely.
Apache 2 based honeypot for detecting and blocking Struts CVE 2017-5638 exploit with added support for content disposition filename parsing vulnerability.
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.