Kako Logo

Kako

0
Free
Visit Website

This project provides honeypots for a number of well known and deployed embedded device vulnerabilities. It is intended for cataloging attack sources, droppers, and payloads. The default configuration runs simulations, captures request information, processes payloads, and supports dependencies like click, boto3, requests, and cerberus. Configuration is done via a YAML document, and output formats include AWS SNS and flat-file JSON.

FEATURES

ALTERNATIVES

A script for setting up a dionaea and kippo honeypot using Docker images.

Fast web fuzzer written in Go

A tool to generate a PNG image containing a XSS payload

A nodejs web application honeypot designed for small environments.

A tool to bypass Content Security Policy (CSP) restrictions

A subset of the Modern Honey Network project set up to run in docker, including hpfeeds broker, cowrie honeypot, and dionaea honeypot.

A honeypot installation for Drupal that supports Go modules and mimics different versions of Drupal.

Open-source honeypot tool for detecting and analyzing malicious activities in the Apache Struts exploit.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved