Kako Logo

Kako

0
Free
Visit Website

This project provides honeypots for a number of well known and deployed embedded device vulnerabilities. It is intended for cataloging attack sources, droppers, and payloads. The default configuration runs simulations, captures request information, processes payloads, and supports dependencies like click, boto3, requests, and cerberus. Configuration is done via a YAML document, and output formats include AWS SNS and flat-file JSON.

FEATURES

ALTERNATIVES

High interaction honeypot solution for Linux systems with data control and integrity features.

Python web application honeypot with vulnerability type emulation and modular design.

A low-interaction honeypot that simulates network services to detect and monitor potential intrusion attempts on internal networks.

Helix is a versatile honeypot designed to mimic the behavior of various protocols including Kubernetes API server, HTTP, TCP, and UDP.

Python telnet honeypot for catching botnet binaries

RDP based Honeypot that creates virtual machines for incoming connections and analyzes traffic with Suricata.

A hybrid honeypot framework that combines low and high interaction honeypots for network security

A tool for testing subdomain takeover possibilities at a mass scale.

PINNED