Kako Logo

Kako

0
Free
Updated 11 March 2025
Visit Website

This project provides honeypots for a number of well known and deployed embedded device vulnerabilities. It is intended for cataloging attack sources, droppers, and payloads. The default configuration runs simulations, captures request information, processes payloads, and supports dependencies like click, boto3, requests, and cerberus. Configuration is done via a YAML document, and output formats include AWS SNS and flat-file JSON.

FEATURES

SIMILAR TOOLS

Helix is a versatile honeypot designed to mimic the behavior of various protocols including Kubernetes API server, HTTP, TCP, and UDP.

Tango is a set of scripts and Splunk apps for deploying honeypots with ease.

An open-source Python software for creating honeypots and honeynets securely.

Honeypot tool with bug-catching capabilities and support for multiple protocols.

A tool for testing subdomain takeover possibilities at a mass scale.

A honeypot daemon project for processing, filtering, and redirecting incoming traffic to a sandbox environment.

A tool to generate a PNG image containing a XSS payload

A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.

Multi-honeypot platform with various honeypots and monitoring tools.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved