OWA Honeypot Logo

OWA Honeypot

0
Free
Updated 11 March 2025
Visit Website

A basic Flask-based Outlook Web App (OWA) honeypot designed for cybersecurity enthusiasts to experiment with OWA-specific threat scenarios. The tool simulates an OWA environment to attract and analyze potential malicious activities, providing valuable insights for defense strategies. To install, clone the GitHub repository, set up a Python3 virtual environment, install dependencies, and run the 'owa_pot.py' script. Caution: Running the honeypot on port 80 is not recommended for internet-facing deployments. For more information, refer to the write-up at https://joda32.github.io/2019/06/11/owa-plus-pastebin.html.

FEATURES

SIMILAR TOOLS

LaBrea is a 'sticky' honeypot and IDS tool that traps malicious actors by creating virtual servers on unused IP addresses.

A high-interaction honeypot solution for detecting and analyzing SMB-based attacks

Honeypot for Telnet service with configurable settings.

A honeypot system that allows you to set up a decoy API to detect and analyze potential security threats.

A tool for testing subdomain takeover possibilities at a mass scale.

Django App for the SSH Honeypot called 'kippo'

A honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689

A low-interaction honeypot that logs IP addresses, usernames, and passwords used by clients connecting via SSH, primarily used for gathering intelligence on brute force attacks.

A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved