Honeyku Logo

Honeyku

0
Free
Visit Website

Honeyku allows you to create and monitor fake HTTP endpoints automatically. You can then place these URL honeytokens in e.g. your inbox, documents, browser history, or embed them as {hidden} links in your web pages. Depending on how and where you implement honeytokens, you may detect human attackers, malicious insiders, content scrapers, or bad bots. Honeyku is designed to be deployed on Heroku cloud application platform (PaaS), but as it uses Flask microframework it's not dependent to AWS API Gateway (like honeyλ) or any other cloud services. So you can deploy it on your own server as well! Setup a FREE Heroku account. Install Python version 3.* Install Pipenv $ pip install pipenv OR $ brew install pipenv (on macOS) Install Heroku Cli: Clone the app source-code $ git c

FEATURES

ALTERNATIVES

A honeypot for the Log4Shell vulnerability (CVE-2021-44228) with various detection and logging features.

KFSensor is an advanced Windows honeypot system for detecting hackers and worms by simulating vulnerable system services.

Tango is a set of scripts and Splunk apps for deploying honeypots with ease.

A tool to bypass Content Security Policy (CSP) restrictions

A security platform that automates the deployment and management of security canaries across cloud infrastructure to detect potential intrusions and unauthorized access.

Commercial

A low-interaction honeypot that simulates network services to detect and monitor potential intrusion attempts on internal networks.

FTP Honeypot tool with FTP + SSL-FTP features, used for catching credentials and malware files, distributing honeytoken files, and generating SSL certificates.

Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.