Honepot for CVE-2019-19781 Logo

Honepot for CVE-2019-19781

0
Free
Updated 11 March 2025
Visit Website

Detect and log CVE-2019-19781 scan and exploitation attempts. Requirements: python3 openssl Usage: Clone repo: git clone https://github.com/MalwareTech/CitrixHoneypot.git CitrixHoneypot && cd CitrixHoneypot Make ssl and logs directory: mkdir logs ssl Generate self signed SSL certificate: openssl req -newkey rsa:2048 -nodes -keyout ssl/key.pem -x509 -days 365 -out ssl/cert.pem run: python3 CitrixHoneypot.py Docker Usage (Optional): docker build -t citrixhoneypot . docker run -d -p 443:443 -v /<insert-homepath>/CitrixHoneypot:/CitrixHoneypot -w /CitrixHoneypot citrixhoneypot Licencing Agreement: MalwareTech Public Licence This software is free to use providing the user yells "Oh no, the cyberhackers are coming!" prior to each installation.

FEATURES

SIMILAR TOOLS

Python telnet honeypot for catching botnet binaries

A webapp for displaying statistics about your kippo SSH honeypot.

SHIVA: Spam Honeypot with Intelligent Virtual Analyzer for capturing and analyzing spam data.

A modified version of OpenSSH deamon forwarding commands to Cowrie for logging brute force attacks and shell interactions.

A low-interaction honeypot that logs IP addresses, usernames, and passwords used by clients connecting via SSH, primarily used for gathering intelligence on brute force attacks.

Modular honeypot based on Python with support for Siemens S7 protocol.

A crawler-based low-interaction client honeypot for exposing website threats.

WordPress honeypot tool running in a Docker container for monitoring access attempts.

A tool to leak git repositories from misconfigured websites

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved