An Elasticsearch honeypot written in NodeJS, designed to capture every attempt to exploit CVE-2014-3120. Prerequisite: NodeJS - v0.10.x, NodeJS Package Manager - npm v1.4.x. Install by downloading and extracting to /opt/espot, then running the following commands: $ cd /opt/espot $ npm install $ mv config.js-sample config.js. Configure config.js with default responses, logging settings, and timezone. ESPot can send a POST request with JSON data to a provided URL for logging purposes. To run as a daemon, use forever. Source code is released under the General Public License version 3.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An open-source Python software for creating honeypots and honeynets securely.
A low Interaction Client honeypot designed to detect malicious websites through signature, anomaly and pattern matching techniques.
A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.