This project provides honeypots for a number of well known and deployed embedded device vulnerabilities. It is intended for cataloging attack sources, droppers, and payloads. The default configuration runs simulations, captures request information, processes payloads, and supports dependencies like click, boto3, requests, and cerberus. Configuration is done via a YAML document, and output formats include AWS SNS and flat-file JSON.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A honeypot mimicking Tomcat manager endpoints to log requests and save attacker's WAR files for analysis.
A crawler-based low-interaction client honeypot for exposing website threats.
A medium interaction printer honeypot that simulates a standard networked printer
Distributed low interaction honeypot with Agent/Master design supporting various protocol handlers.
A honeypot for remote file inclusion (RFI) and local file inclusion (LFI) using fake URLs to catch scanning bots and malwares.