OpenCanary is a multi-protocol network honeypot that runs as a daemon and implements multiple common network protocols. It has extremely low resource requirements and can be tweaked, modified, and extended. When attackers breach networks and interact with the honeypot, OpenCanary sends alerts via a variety of mechanisms. It is implemented in Python and is cross-platform, with certain features requiring specific OSes. Running on Linux provides the most options, and it can be deployed on devices like a Raspberry Pi or a VM with minimal resources. OpenCanary is the Open Source version of the commercial Thinkst Canary honeypot.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A tool to identify potential subdomain takeovers by checking if a CNAME record resolves to the scope address.
Blacknet is a low interaction SSH multi-head honeypot system with logging capabilities.
A honeypot for remote file inclusion (RFI) and local file inclusion (LFI) using fake URLs to catch scanning bots and malwares.
A honeypot tool to detect and log CVE-2019-19781 scan and exploitation attempts.
A web honeypot tool for detecting and monitoring potential attacks on phpMyAdmin installations.
Create and monitor fake HTTP endpoints automatically with Honeyku, deployable on Heroku or your own server.