OWA Honeypot Logo

OWA Honeypot

0
Free
Visit Website

A basic Flask-based Outlook Web App (OWA) honeypot designed for cybersecurity enthusiasts to experiment with OWA-specific threat scenarios. The tool simulates an OWA environment to attract and analyze potential malicious activities, providing valuable insights for defense strategies. To install, clone the GitHub repository, set up a Python3 virtual environment, install dependencies, and run the 'owa_pot.py' script. Caution: Running the honeypot on port 80 is not recommended for internet-facing deployments. For more information, refer to the write-up at https://joda32.github.io/2019/06/11/owa-plus-pastebin.html.

FEATURES

ALTERNATIVES

A highly interactive honeypot for observing access from attackers by building easily targeted and compromised web applications, forwarding logs to Google BigQuery for accumulation and visualization.

Building Honeypots for Industrial Networks using Honeyd and simulating SCADA, DCS, and PLC architectures.

Hived is a honeypot tool for deceiving attackers and gathering information.

SMTP honeypot tool with configurable response messages, email storage, and automatic information extraction.

A tool for bruteforcing subdomains of a given domain

A modular web application honeypot framework with automation and logging capabilities.

A honeypot tool emulating HL7 / FHIR protocols with various installation and customization options.

SSHoney is an SSH honeypot for logging SSH connection attempts.