DionaeaFR Logo

DionaeaFR

0
Free
Updated 11 March 2025
Visit Website

DionaeaFR is a low-interaction honeypot that uses Dionaea as its core. It provides a simple and easy-to-use interface for setting up and managing honeypots. It uses Python 2.7.3, Django 1.4, Jquery 1.7.2, Bootstrap Framework 2.1.1, jVectorMap 1.0, Kendo-UI v2011.3.1129, and SQLite3. It also requires pip install Django, pip install pygeoip, pip install django-pagination, pip install django-tables2, pip install django-compressor, pip install django-htmlmin, and pip install django-filter. Additionally, it requires django-tables2-simplefilter, SubnetTree, and nodejs. It also requires GeoIP and GeoLiteCity, which can be downloaded from geolite.maxmind.com.

FEATURES

SIMILAR TOOLS

Docker-based honeypot setup with detailed installation and configuration instructions.

A low to medium interaction honeypot with a variety of plugins for cybersecurity monitoring.

A honeypot agent for running honeypots with service and data at threatwar.com.

A low-interaction honeypot that logs IP addresses, usernames, and passwords used by clients connecting via SSH, primarily used for gathering intelligence on brute force attacks.

A crawler-based low-interaction client honeypot for exposing website threats.

A medium interaction printer honeypot that simulates a standard networked printer

LaBrea is a 'sticky' honeypot and IDS tool that traps malicious actors by creating virtual servers on unused IP addresses.

A signature-based, multi-step, high interaction honeypot detection tool with support for various detection methods and protocols.

A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved