Detect and log CVE-2019-19781 scan and exploitation attempts. Requirements: python3 openssl Usage: Clone repo: git clone https://github.com/MalwareTech/CitrixHoneypot.git CitrixHoneypot && cd CitrixHoneypot Make ssl and logs directory: mkdir logs ssl Generate self signed SSL certificate: openssl req -newkey rsa:2048 -nodes -keyout ssl/key.pem -x509 -days 365 -out ssl/cert.pem run: python3 CitrixHoneypot.py Docker Usage (Optional): docker build -t citrixhoneypot . docker run -d -p 443:443 -v /<insert-homepath>/CitrixHoneypot:/CitrixHoneypot -w /CitrixHoneypot citrixhoneypot Licencing Agreement: MalwareTech Public Licence This software is free to use providing the user yells "Oh no, the cyberhackers are coming!" prior to each installation.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
A web-based visualization tool that displays statistics and generates charts from Shockpot honeypot data stored in PostgreSQL databases.
A low interaction client honeypot that detects malicious websites using signature, anomaly and pattern matching techniques with automated URL collection and JavaScript analysis capabilities.
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
A WordPress plugin that logs failed login attempts to help monitor unauthorized access attempts on WordPress websites.
A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server