Medpot is a honeypot that emulates HL7 / FHIR protocols. Installation requires go 1.17 or newer. Dependencies can be installed using bash scripts/dependencies.sh. You can run the tool using bash scripts/run_medpot.sh or go run go/*.go, compile it using bash scripts/compile_medpot.sh or go build -o medpot go/*.go, create a copy on disk and necessary files using make and make install, or create a Docker container with bash scripts/compile_docker.sh. Medpot listens on port 2575 by default and supports arguments such as setting a logo, port, and log location.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A honeypot tool to detect and log CVE-2019-19781 scan and exploitation attempts.
A low interaction client honeypot that detects malicious websites using signature, anomaly and pattern matching techniques with automated URL collection and JavaScript analysis capabilities.
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
A Docker-based honeypot network implementation featuring cowrie and dionaea honeypots with centralized event collection, geolocation enrichment, and real-time attack visualization.
A web-based visualization tool that displays statistics and generates charts from Shockpot honeypot data stored in PostgreSQL databases.
A plugin repository that extends the Honeycomb honeypot framework with additional features and capabilities for enhanced threat detection and analysis.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.