Honepot for CVE-2019-19781 Logo

Honepot for CVE-2019-19781

0
Free
Visit Website

Detect and log CVE-2019-19781 scan and exploitation attempts. Requirements: python3 openssl Usage: Clone repo: git clone https://github.com/MalwareTech/CitrixHoneypot.git CitrixHoneypot && cd CitrixHoneypot Make ssl and logs directory: mkdir logs ssl Generate self signed SSL certificate: openssl req -newkey rsa:2048 -nodes -keyout ssl/key.pem -x509 -days 365 -out ssl/cert.pem run: python3 CitrixHoneypot.py Docker Usage (Optional): docker build -t citrixhoneypot . docker run -d -p 443:443 -v /<insert-homepath>/CitrixHoneypot:/CitrixHoneypot -w /CitrixHoneypot citrixhoneypot Licencing Agreement: MalwareTech Public Licence This software is free to use providing the user yells "Oh no, the cyberhackers are coming!" prior to each installation.

FEATURES

ALTERNATIVES

Beelzebub is an advanced honeypot framework for detecting and analyzing cyber attacks, with integration options for OpenAI GPT-3 and deployment on Kubernetes using Helm.

Tango is a set of scripts and Splunk apps for deploying honeypots with ease.

A low to medium interaction honeypot with a variety of plugins for cybersecurity monitoring.

High interaction honeypot solution for Linux systems with data control and integrity features.

ElasticSearch honeypot to capture attempts to exploit CVE-2014-3120, with logging and daemon options.

A simple web-based interface for subdomain enumeration using the subfinder tool.

A basic Flask-based Outlook Web App (OWA) honeypot for cybersecurity experimentation.

A low-interaction honeypot that uses Dionaea as its core, providing a simple and easy-to-use interface for setting up and managing honeypots.

PINNED