Log4Pot Logo

Log4Pot

0
Free
Updated 11 March 2025
Visit Website

A honeypot designed to detect and capture exploitation attempts of the Log4Shell vulnerability (CVE-2021-44228). It listens on various ports for Log4Shell exploitation, detects exploitation in request lines and headers, downloads exploit payloads recursively, and offers logging to both file and Azure blob storage. To use, install Poetry, clone the GitHub repository, install dependencies, configure parameters in log4pot.conf, and run the tool. It can also be run without external dependencies for basic functionality. For redirecting traffic to Log4Pot, iptables commands can be used.

FEATURES

SIMILAR TOOLS

Parse Cowrie honeypot logs into a Neo4j database.

A simple web-based interface for subdomain enumeration using the subfinder tool.

A low-interaction honeypot that simulates network services to detect and monitor potential intrusion attempts on internal networks.

Troje is a honeypot that creates a realistic environment within lxc containers to monitor and record traffic and changes to drives.

An automation framework for subdomain bruteforcing

A Go-based honeypot server for detecting and logging attacker activity

An extensible and open-source system for running, monitoring, and managing honeypots with advanced features.

An LLM-based honeypot file system creator that generates realistic file systems and configurations to lure attackers and improve analyst engagement.

A honeypot agent for running honeypots with service and data at threatwar.com.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved