Glastopf is a Python web application honeypot founded by Lukas Rist. General approach: Vulnerability type emulation instead of vulnerability emulation. Once a vulnerability type is emulated, Glastopf can handle unknown attacks of the same type. While implementation may be slower and more complicated, we remain ahead of the attackers until they come up with a new method or discover a new flaw in our implementation. Modular design to add new logging capabilities or attack type handlers. Various database capabilities are already in place. HPFeeds logging is supported for centralized data collection. Popular attack type emulation is already in place: Remote File Inclusion via a build-in PHP sandbox, Local File Inclusion providing files from a virtual file system and HTML injection via POST requests. Adversaries usually use search engines and special crafted search requests to find their victims. In order to attract them, Glastopf provides those keywords (AKA 'dork') and additionally extracts them from requests, extending its attack surface automatically. As a result, the honeypot gets more and more
Common questions about Glastopf including features, pricing, alternatives, and user reviews.
Glastopf is Python web application honeypot with vulnerability type emulation and modular design. It is a Security Operations solution designed to help security teams with PHP.
Glastopf is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/mushorg/glastopf/ for download and installation instructions.
Popular alternatives to Glastopf include:
Compare all Glastopf alternatives at https://cybersectools.com/alternatives/glastopf
Glastopf is for security teams and organizations that need PHP. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Head-to-head feature, pricing, and rating breakdowns.
TANNER is a remote data analysis service that evaluates HTTP requests and generates responses for SNARE honeypots while emulating application vulnerabilities.
A web-based visualization tool that displays statistics and generates charts from Shockpot honeypot data stored in PostgreSQL databases.
A WordPress plugin that logs failed login attempts to help monitor unauthorized access attempts on WordPress websites.
A toolkit that transforms PHP applications into web-based high-interaction Honeypots for monitoring and analyzing attacks.