Honeyku allows you to create and monitor fake HTTP endpoints automatically. You can then place these URL honeytokens in e.g. your inbox, documents, browser history, or embed them as {hidden} links in your web pages. Depending on how and where you implement honeytokens, you may detect human attackers, malicious insiders, content scrapers, or bad bots. Honeyku is designed to be deployed on Heroku cloud application platform (PaaS), but as it uses Flask microframework it's not dependent to AWS API Gateway (like honeyλ) or any other cloud services. So you can deploy it on your own server as well! Setup a FREE Heroku account. Install Python version 3.* Install Pipenv $ pip install pipenv OR $ brew install pipenv (on macOS) Install Heroku Cli: Clone the app source-code $ git c
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server
A plugin repository that extends the Honeycomb honeypot framework with additional features and capabilities for enhanced threat detection and analysis.
A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.
An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.