MICROS Honeypot Logo

MICROS Honeypot

0
Free
Visit Website

MICROS Honeypot is a low interaction honeypot designed to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS). This honeypot simulates the MICROS server, allowing attackers to exploit the directory traversal vulnerability to 'steal files' and reports such attempts. It is released under the MIT license for community use, and pull requests are welcome. For usage, run without parameters to listen on the default port (8080) or with --help to see other command line parameters.

FEATURES

ALTERNATIVES

A low-interaction honeypot for detecting and analyzing security threats

A collection of tools that can be used with Honeyd for data analysis or other purposes

Fast web fuzzer written in Go

A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server

A web application honeypot sensor attracting malicious traffic from the Internet

Python web application honeypot with vulnerability type emulation and modular design.

A tool to leak git repositories from misconfigured websites

GasPot is a honeypot simulation tool for Gas Station tanks in the oil and gas industry.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved