Honeyku Logo

Honeyku

0
Free
Visit Website

Honeyku allows you to create and monitor fake HTTP endpoints automatically. You can then place these URL honeytokens in e.g. your inbox, documents, browser history, or embed them as {hidden} links in your web pages. Depending on how and where you implement honeytokens, you may detect human attackers, malicious insiders, content scrapers, or bad bots. Honeyku is designed to be deployed on Heroku cloud application platform (PaaS), but as it uses Flask microframework it's not dependent to AWS API Gateway (like honeyλ) or any other cloud services. So you can deploy it on your own server as well! Setup a FREE Heroku account. Install Python version 3.* Install Pipenv $ pip install pipenv OR $ brew install pipenv (on macOS) Install Heroku Cli: Clone the app source-code $ git c

FEATURES

ALTERNATIVES

Medium interaction SSH honeypot for logging brute force attacks and shell interactions.

Tango is a set of scripts and Splunk apps for deploying honeypots with ease.

A tool for bruteforcing subdomains of a given domain

A tool to identify potential subdomain takeovers by checking if a CNAME record resolves to the scope address.

Open-source honeypot tool for detecting and analyzing malicious activities in the Apache Struts exploit.

An extensible and open-source system for running, monitoring, and managing honeypots with advanced features.

Helix is a versatile honeypot designed to mimic the behavior of various protocols including Kubernetes API server, HTTP, TCP, and UDP.

Find domains and subdomains related to a given domain