Loading...
This project provides honeypots for a number of well known and deployed embedded device vulnerabilities. It is intended for cataloging attack sources, droppers, and payloads. The default configuration runs simulations, captures request information, processes payloads, and supports dependencies like click, boto3, requests, and cerberus. Configuration is done via a YAML document, and output formats include AWS SNS and flat-file JSON.
Common questions about Kako including features, pricing, alternatives, and user reviews.
Kako is A project providing honeypots for embedded device vulnerabilities with support for AWS integration and JSON output.. It is a Security Operations solution designed to help security teams with Vulnerability, Payload Generation.
A honeypot specifically designed to detect and capture Log4Shell vulnerability exploitation attempts with payload analysis and flexible logging capabilities.
Get strategic cybersecurity insights in your inbox