Miniprint acts like a standard networked printer that has been accidentally exposed to the public internet. It speaks the Printer Job Language (PJL) over the raw network protocol. Features include a fully-featured virtual filesystem in which attackers can read and write files and directories - nothing gets written to the host. Any PostScript or plaintext print jobs sent to the printer will be saved to the uploads/ directory. Extensive logging is also provided. It is recommended to install the tool using virtualenv and pip3. Usage: miniprint [-b,--bind HOST] [-l,--log-file FILE] [-t,--time-out TIME] [-h] Optional arguments include -b, --bind <host> to bind the server to a specific host, -l, --log-file <file> to save logs to a specific file, and -t, --timeout <time> to set a time limit for commands before disconnecting the client. To interactively attack miniprint on localhost, you can use the command `miniprint`.
FEATURES
SIMILAR TOOLS
A honeypot tool to detect and log CVE-2019-19781 scan and exploitation attempts.
A full featured script to visualize statistics from a Shockpot honeypot, based on Kippo-Graph and utilizing various PHP libraries.
A low Interaction Client honeypot designed to detect malicious websites through signature, anomaly and pattern matching techniques.
A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.
A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.