MICROS Honeypot Logo

MICROS Honeypot

0
Free
Visit Website

MICROS Honeypot is a low interaction honeypot designed to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS). This honeypot simulates the MICROS server, allowing attackers to exploit the directory traversal vulnerability to 'steal files' and reports such attempts. It is released under the MIT license for community use, and pull requests are welcome. For usage, run without parameters to listen on the default port (8080) or with --help to see other command line parameters.

FEATURES

ALTERNATIVES

Medium interaction SSH honeypot for logging brute force attacks and shell interactions.

A honeypot tool that simulates an open relay to capture and analyze spam

IMAP-Honey is a honeypot tool for IMAP and SMTP protocols with support for logging to console or syslog.

Tango is a set of scripts and Splunk apps for deploying honeypots with ease.

Find domains and subdomains related to a given domain

A tool to leak git repositories from misconfigured websites

A honeypot for the SSH Service

Docker-based honeypot setup with detailed installation and configuration instructions.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved