ESPot Logo

ESPot

0
Free
Visit Website

An Elasticsearch honeypot written in NodeJS, designed to capture every attempt to exploit CVE-2014-3120. Prerequisite: NodeJS - v0.10.x, NodeJS Package Manager - npm v1.4.x. Install by downloading and extracting to /opt/espot, then running the following commands: $ cd /opt/espot $ npm install $ mv config.js-sample config.js. Configure config.js with default responses, logging settings, and timezone. ESPot can send a POST request with JSON data to a provided URL for logging purposes. To run as a daemon, use forever. Source code is released under the General Public License version 3.

FEATURES

ALTERNATIVES

A script for setting up a dionaea and kippo honeypot using Docker images.

An extensible and open-source system for running, monitoring, and managing honeypots with advanced features.

A honeypot daemon project for processing, filtering, and redirecting incoming traffic to a sandbox environment.

A crawler-based low-interaction client honeypot for exposing website threats.

A simple web-based interface for subdomain enumeration using the subfinder tool.

A tool to declutter URL lists for crawling and pentesting

A nodejs web application honeypot designed for small environments.

An observation camera honeypot for proof-of-concept purposes

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved