MICROS Honeypot Logo

MICROS Honeypot

0
Free
Updated 11 March 2025
Visit Website

MICROS Honeypot is a low interaction honeypot designed to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS). This honeypot simulates the MICROS server, allowing attackers to exploit the directory traversal vulnerability to 'steal files' and reports such attempts. It is released under the MIT license for community use, and pull requests are welcome. For usage, run without parameters to listen on the default port (8080) or with --help to see other command line parameters.

FEATURES

SIMILAR TOOLS

Beelzebub is an advanced honeypot framework for detecting and analyzing cyber attacks, with integration options for OpenAI GPT-3 and deployment on Kubernetes using Helm.

A DNS server for executing DNS Rebinding attacks

A tool for testing subdomain takeover possibilities at a mass scale.

High-interaction SSH honeypot for logging SSH proxy with ongoing development.

A basic Flask-based Outlook Web App (OWA) honeypot for cybersecurity experimentation.

Automated script to install and deploy a honeypot with kippo, dionaea, and p0f on Ubuntu 12.04.

SSH Honeypot written in Go that records commands and IP addresses of attempted logins.

A honeypot tool emulating HL7 / FHIR protocols with various installation and customization options.

A subdomain finder tool

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved