Glastopf Logo

Glastopf

0
Free
Visit Website

Glastopf is a Python web application honeypot founded by Lukas Rist. General approach: Vulnerability type emulation instead of vulnerability emulation. Once a vulnerability type is emulated, Glastopf can handle unknown attacks of the same type. While implementation may be slower and more complicated, we remain ahead of the attackers until they come up with a new method or discover a new flaw in our implementation. Modular design to add new logging capabilities or attack type handlers. Various database capabilities are already in place. HPFeeds logging is supported for centralized data collection. Popular attack type emulation is already in place: Remote File Inclusion via a build-in PHP sandbox, Local File Inclusion providing files from a virtual file system and HTML injection via POST requests. Adversaries usually use search engines and special crafted search requests to find their victims. In order to attract them, Glastopf provides those keywords (AKA 'dork') and additionally extracts them from requests, extending its attack surface automatically. As a result, the honeypot gets more and more

FEATURES

ALTERNATIVES

HoneyThing is a honeypot for Internet of TR-069 things, emulating vulnerabilities and supporting TR-069 protocol.

A tool for generating permutations, alterations and mutations of subdomains and resolving them

A collection of scripts for debugging SSRF, blind XSS, and XXE vulnerabilities

A webapp for displaying statistics about your kippo SSH honeypot.

A honeypot tool to mimic the router backdoor 'TCP32764' found in various router firmwares, providing a way to test for vulnerabilities.

SMTP honeypot tool with configurable response messages, email storage, and automatic information extraction.

A honeypot system that allows you to set up a decoy API to detect and analyze potential security threats.

Open-source honeypot tool for detecting and analyzing malicious activities in the Apache Struts exploit.