Kojoney is a low level interaction honeypot that emulates an SSH server. The daemon can be started manually or automatically at boot time. It logs activity and provides reporting tools to differentiate between human and bot sessions. It also allows searching for specific data such as sessions, IP addresses, and dates. Kojoney is a valuable tool for cybersecurity professionals interested in honeypots and SSH service security.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
A web-based visualization tool that displays statistics and generates charts from Shockpot honeypot data stored in PostgreSQL databases.
A WordPress plugin that logs failed login attempts to help monitor unauthorized access attempts on WordPress websites.
A Docker-based honeypot network implementation featuring cowrie and dionaea honeypots with centralized event collection, geolocation enrichment, and real-time attack visualization.
An Apache 2 based honeypot with detection capabilities specifically designed to identify and analyze Struts CVE-2017-5638 exploitation attempts.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.