Honeyku Logo

Honeyku

0
Free
Visit Website

Honeyku allows you to create and monitor fake HTTP endpoints automatically. You can then place these URL honeytokens in e.g. your inbox, documents, browser history, or embed them as {hidden} links in your web pages. Depending on how and where you implement honeytokens, you may detect human attackers, malicious insiders, content scrapers, or bad bots. Honeyku is designed to be deployed on Heroku cloud application platform (PaaS), but as it uses Flask microframework it's not dependent to AWS API Gateway (like honeyλ) or any other cloud services. So you can deploy it on your own server as well! Setup a FREE Heroku account. Install Python version 3.* Install Pipenv $ pip install pipenv OR $ brew install pipenv (on macOS) Install Heroku Cli: Clone the app source-code $ git c

FEATURES

ALTERNATIVES

Medium interaction SSH Honeypot with multiple virtual hosts and sandboxed filesystems.

A tutorial on setting up Dionaea on an EC2 instance in 20 minutes

A configurable DNS honeypot with SQLite logging and Docker support.

Hived is a honeypot tool for deceiving attackers and gathering information.

A low-interaction honeypot that logs IP addresses, usernames, and passwords used by clients connecting via SSH, primarily used for gathering intelligence on brute force attacks.

A collection of tools that can be used with Honeyd for data analysis or other purposes

A honeypot tool to mimic the router backdoor 'TCP32764' found in various router firmwares, providing a way to test for vulnerabilities.

A honeypot agent for running honeypots with service and data at threatwar.com.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved