Project Artillery
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
A honeypot designed to detect and capture exploitation attempts of the Log4Shell vulnerability (CVE-2021-44228). It listens on various ports for Log4Shell exploitation, detects exploitation in request lines and headers, downloads exploit payloads recursively, and offers logging to both file and Azure blob storage. To use, install Poetry, clone the GitHub repository, install dependencies, configure parameters in log4pot.conf, and run the tool. It can also be run without external dependencies for basic functionality. For redirecting traffic to Log4Pot, iptables commands can be used.
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
A tool for testing subdomain takeover possibilities at a mass scale.
A honeypot daemon project for processing, filtering, and redirecting incoming traffic to a sandbox environment.
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
A tool to declutter URL lists for crawling and pentesting
A low-interaction honeypot that logs IP addresses, usernames, and passwords used by clients connecting via SSH, primarily used for gathering intelligence on brute force attacks.