Honeytrap by Till Mannw Logo

Honeytrap by Till Mannw

0
Free
Updated 11 March 2025
Visit Website

Honeytrap is a low-interaction honeypot and network security tool written to catch attacks against TCP and UDP services. In its default configuration, it runs as a daemon and starts server processes on demand when a connection attempt to a port is made. Different modes of operation are available that control how connections are handled. In normal mode, a server sends arbitrary data provided in template files as a basic means to emulate well-known protocols. Many automated attack tools will be fooled and continue with the attack dialog. A popular mode is the so-called mirror mode in which incoming connections are proxied back to the initiator. This trick eliminates the need for protocol emulation in many cases. A third mode, the proxy mode, allows forwarding of specific sessions to other systems, e.g., high-interaction honeypots. Plugins: A module API provides an easy way to write custom extensions that are dynamically loaded into the honeypot. Arriving attack data is assembled to a so-called attack string that can be saved to files or a SQL database for manual investigation. Honeytrap comes with different plugins that run on these attack strings to extract additional info.

FEATURES

SIMILAR TOOLS

A signature-based, multi-step, high interaction honeypot detection tool with support for various detection methods and protocols.

An automation framework for subdomain bruteforcing

A tool to leak git repositories from misconfigured websites

Galah is an LLM-powered web honeypot that mimics various web applications by dynamically responding to HTTP requests.

LaBrea is a 'sticky' honeypot and IDS tool that traps malicious actors by creating virtual servers on unused IP addresses.

A high-interaction honeypot system supporting the Redis protocol.

Blacknet is a low interaction SSH multi-head honeypot system with logging capabilities.

A honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689

A medium interaction printer honeypot that simulates a standard networked printer

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved