ESPot Logo

ESPot

0
Free
Visit Website

An Elasticsearch honeypot written in NodeJS, designed to capture every attempt to exploit CVE-2014-3120. Prerequisite: NodeJS - v0.10.x, NodeJS Package Manager - npm v1.4.x. Install by downloading and extracting to /opt/espot, then running the following commands: $ cd /opt/espot $ npm install $ mv config.js-sample config.js. Configure config.js with default responses, logging settings, and timezone. ESPot can send a POST request with JSON data to a provided URL for logging purposes. To run as a daemon, use forever. Source code is released under the General Public License version 3.

FEATURES

ALTERNATIVES

A webapp for displaying statistics about your kippo SSH honeypot.

A hybrid honeypot framework that combines low and high interaction honeypots for network security

A web honeypot tool for detecting and monitoring potential attacks on phpMyAdmin installations.

Medium interaction SSH Honeypot with multiple virtual hosts and sandboxed filesystems.

A low-interaction honeypot that uses Dionaea as its core, providing a simple and easy-to-use interface for setting up and managing honeypots.

A basic Flask-based Outlook Web App (OWA) honeypot for cybersecurity experimentation.

Uploader honeypot designed to look like poor website security.

A low-interaction SSH honeypot tool for recording authentication attempts.