Log4Pot Logo

Log4Pot

0
Free
Visit Website

A honeypot designed to detect and capture exploitation attempts of the Log4Shell vulnerability (CVE-2021-44228). It listens on various ports for Log4Shell exploitation, detects exploitation in request lines and headers, downloads exploit payloads recursively, and offers logging to both file and Azure blob storage. To use, install Poetry, clone the GitHub repository, install dependencies, configure parameters in log4pot.conf, and run the tool. It can also be run without external dependencies for basic functionality. For redirecting traffic to Log4Pot, iptables commands can be used.

FEATURES

ALTERNATIVES

A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server

Honeypot platform for tracking and monitoring UDP-based DDoS attacks with support for various honeypot services.

A list of services and how to claim (sub)domains with dangling DNS records.

A script for setting up a dionaea and kippo honeypot using Docker images.

A signature-based, multi-step, high interaction honeypot detection tool with support for various detection methods and protocols.

A directory traversal fuzzer for finding and exploiting directory traversal vulnerabilities.

An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.

Beelzebub is an advanced honeypot framework for detecting and analyzing cyber attacks, with integration options for OpenAI GPT-3 and deployment on Kubernetes using Helm.

PINNED