Kako Logo

Kako

0
Free
Visit Website

This project provides honeypots for a number of well known and deployed embedded device vulnerabilities. It is intended for cataloging attack sources, droppers, and payloads. The default configuration runs simulations, captures request information, processes payloads, and supports dependencies like click, boto3, requests, and cerberus. Configuration is done via a YAML document, and output formats include AWS SNS and flat-file JSON.

FEATURES

ALTERNATIVES

A Go-based honeypot server for detecting and logging attacker activity

An observation camera honeypot for proof-of-concept purposes

Modular honeypot based on Python with support for Siemens S7 protocol.

Tango is a set of scripts and Splunk apps for deploying honeypots with ease.

Uploader honeypot designed to look like poor website security.

A web application honeypot sensor attracting malicious traffic from the Internet

Low interaction MySQL honeypot with various configuration options.

Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.