Kako Logo

Kako

0
Free
Visit Website

This project provides honeypots for a number of well known and deployed embedded device vulnerabilities. It is intended for cataloging attack sources, droppers, and payloads. The default configuration runs simulations, captures request information, processes payloads, and supports dependencies like click, boto3, requests, and cerberus. Configuration is done via a YAML document, and output formats include AWS SNS and flat-file JSON.

FEATURES

ALTERNATIVES

RDP based Honeypot that creates virtual machines for incoming connections and analyzes traffic with Suricata.

An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.

Beelzebub is an advanced honeypot framework for detecting and analyzing cyber attacks, with integration options for OpenAI GPT-3 and deployment on Kubernetes using Helm.

A web application honeypot sensor attracting malicious traffic from the Internet

A PoC tool for utilizing GPT3.5 in developing an SMTP honeypot.

Multi-honeypot platform with various honeypots and monitoring tools.

Building Honeypots for Industrial Networks using Honeyd and simulating SCADA, DCS, and PLC architectures.

A Python-based honeypot service for SSH, FTP, and Telnet connections