Hudinx is a medium interaction SSH honeypot designed to log brute force attacks and the entire shell interaction performed by the attacker. It features a fake filesystem with the ability to add/remove files, a full fake filesystem resembling a Debian 5.0 installation, the possibility of adding fake file contents, session logs stored in a format for easy replay, saving files downloaded with wget for later inspection, and various trickery like pretending to connect somewhere and exit not really exiting. Requirements include operating systems like Debian, CentOS, FreeBSD, and Windows 7, 8, 10, Python 2.7+, Twisted, PyCrypto, StrawberryPerl, and Zope Interface.
FEATURES
ALTERNATIVES
A low-interaction honeypot that logs IP addresses, usernames, and passwords used by clients connecting via SSH, primarily used for gathering intelligence on brute force attacks.
SHIVA: Spam Honeypot with Intelligent Virtual Analyzer for capturing and analyzing spam data.
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
A honeypot tool to detect and log CVE-2019-19781 scan and exploitation attempts.
Apache 2 based honeypot for detecting and blocking Struts CVE 2017-5638 exploit with added support for content disposition filename parsing vulnerability.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.