DionaeaFR is a low-interaction honeypot that uses Dionaea as its core. It provides a simple and easy-to-use interface for setting up and managing honeypots. It uses Python 2.7.3, Django 1.4, Jquery 1.7.2, Bootstrap Framework 2.1.1, jVectorMap 1.0, Kendo-UI v2011.3.1129, and SQLite3. It also requires pip install Django, pip install pygeoip, pip install django-pagination, pip install django-tables2, pip install django-compressor, pip install django-htmlmin, and pip install django-filter. Additionally, it requires django-tables2-simplefilter, SubnetTree, and nodejs. It also requires GeoIP and GeoLiteCity, which can be downloaded from geolite.maxmind.com.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A honeypot agent for running honeypots with service and data at threatwar.com.
A low-interaction honeypot that logs IP addresses, usernames, and passwords used by clients connecting via SSH, primarily used for gathering intelligence on brute force attacks.
A crawler-based low-interaction client honeypot for exposing website threats.
A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.