A script to run a dionaea docker image and kippo docker image. The next iteration of the honeypot setup script includes all dependencies in the Docker images for better compatibility across operating systems. Pre-requisites: Docker 1.3+ and docker-compose installed. Setup moves SSH from port 22 to 65534, installs dionaea and micheloosterhof/kippo, saves all logs and binaries to $PWD/var, sets up dionaea and kippo as system services that run on startup, and utilizes Docker.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An Apache 2 based honeypot with detection capabilities specifically designed to identify and analyze Struts CVE-2017-5638 exploitation attempts.
A low interaction client honeypot that detects malicious websites using signature, anomaly and pattern matching techniques with automated URL collection and JavaScript analysis capabilities.
A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.
A Docker-based honeypot network implementation featuring cowrie and dionaea honeypots with centralized event collection, geolocation enrichment, and real-time attack visualization.
A honeypot tool to detect and log CVE-2019-19781 scan and exploitation attempts.
A WordPress plugin that logs failed login attempts to help monitor unauthorized access attempts on WordPress websites.
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.