Miniprint is a honeypot tool that simulates a networked printer exposed to the public internet. The tool implements the Printer Job Language (PJL) protocol over raw network connections to mimic a real printer device. The honeypot features a complete virtual filesystem that allows attackers to perform read and write operations on files and directories without affecting the host system. All file operations are contained within the virtual environment for security purposes. When attackers send PostScript or plaintext print jobs to the simulated printer, these documents are automatically saved to an uploads directory for analysis. The tool provides comprehensive logging capabilities to track all interactions and attempted attacks. Miniprint can be configured with various options including custom host binding, log file specification, and connection timeout settings. The tool is designed for installation using virtualenv and pip3 for proper dependency management. The honeypot serves as a deception technology to attract and monitor attackers who target exposed printer devices, providing insights into attack patterns and techniques used against network-connected printers.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A Docker-based honeypot network implementation featuring cowrie and dionaea honeypots with centralized event collection, geolocation enrichment, and real-time attack visualization.
A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server
A web-based visualization tool that displays statistics and generates charts from Shockpot honeypot data stored in PostgreSQL databases.
A low interaction client honeypot that detects malicious websites using signature, anomaly and pattern matching techniques with automated URL collection and JavaScript analysis capabilities.
An Apache 2 based honeypot with detection capabilities specifically designed to identify and analyze Struts CVE-2017-5638 exploitation attempts.
A plugin repository that extends the Honeycomb honeypot framework with additional features and capabilities for enhanced threat detection and analysis.
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.