OWA Honeypot Logo

OWA Honeypot

0
Free
Visit Website

A basic Flask-based Outlook Web App (OWA) honeypot designed for cybersecurity enthusiasts to experiment with OWA-specific threat scenarios. The tool simulates an OWA environment to attract and analyze potential malicious activities, providing valuable insights for defense strategies. To install, clone the GitHub repository, set up a Python3 virtual environment, install dependencies, and run the 'owa_pot.py' script. Caution: Running the honeypot on port 80 is not recommended for internet-facing deployments. For more information, refer to the write-up at https://joda32.github.io/2019/06/11/owa-plus-pastebin.html.

FEATURES

ALTERNATIVES

An observation camera honeypot for proof-of-concept purposes

A tool to generate a PNG image containing a XSS payload

Endlessh is an SSH tarpit that traps SSH clients by sending an endless, random SSH banner.

A multiarch honeypot platform supporting 20+ honeypots and offering visualization options and security tools.

Honeypot tool with bug-catching capabilities and support for multiple protocols.

A honeypot tool that simulates an open relay to capture and analyze spam

SSH Honeypot written in Go that records commands and IP addresses of attempted logins.

A honeypot tool emulating HL7 / FHIR protocols with various installation and customization options.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved