An Elasticsearch honeypot written in NodeJS, designed to capture every attempt to exploit CVE-2014-3120. Prerequisite: NodeJS - v0.10.x, NodeJS Package Manager - npm v1.4.x. Install by downloading and extracting to /opt/espot, then running the following commands: $ cd /opt/espot $ npm install $ mv config.js-sample config.js. Configure config.js with default responses, logging settings, and timezone. ESPot can send a POST request with JSON data to a provided URL for logging purposes. To run as a daemon, use forever. Source code is released under the General Public License version 3.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A honeypot tool to detect and log CVE-2019-19781 scan and exploitation attempts.
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.
A Docker-based honeypot network implementation featuring cowrie and dionaea honeypots with centralized event collection, geolocation enrichment, and real-time attack visualization.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.