Kako Logo

Kako

0
Free
Visit Website

This project provides honeypots for a number of well known and deployed embedded device vulnerabilities. It is intended for cataloging attack sources, droppers, and payloads. The default configuration runs simulations, captures request information, processes payloads, and supports dependencies like click, boto3, requests, and cerberus. Configuration is done via a YAML document, and output formats include AWS SNS and flat-file JSON.

FEATURES

ALTERNATIVES

A simple Elasticsearch honeypot to catch attackers exploiting RCE vulnerabilities.

Galah is an LLM-powered web honeypot that mimics various web applications by dynamically responding to HTTP requests.

A mini webserver with FTP support for XXE payloads

An active and aggressive honeypot tool for network security.

Create and monitor fake HTTP endpoints automatically with Honeyku, deployable on Heroku or your own server.

A honeypot tool to mimic the router backdoor 'TCP32764' found in various router firmwares, providing a way to test for vulnerabilities.

Ansible role for deploying and managing Bifrozt honeypots

A low-interaction honeypot that simulates network services to detect and monitor potential intrusion attempts on internal networks.