OWA Honeypot Logo

OWA Honeypot

0
Free
Visit Website

A basic Flask-based Outlook Web App (OWA) honeypot designed for cybersecurity enthusiasts to experiment with OWA-specific threat scenarios. The tool simulates an OWA environment to attract and analyze potential malicious activities, providing valuable insights for defense strategies. To install, clone the GitHub repository, set up a Python3 virtual environment, install dependencies, and run the 'owa_pot.py' script. Caution: Running the honeypot on port 80 is not recommended for internet-facing deployments. For more information, refer to the write-up at https://joda32.github.io/2019/06/11/owa-plus-pastebin.html.

FEATURES

ALTERNATIVES

Repository of plugins for the Honeycomb honeypot framework

A tool to identify potential subdomain takeovers by checking if a CNAME record resolves to the scope address.

A low-interaction honeypot that uses Dionaea as its core, providing a simple and easy-to-use interface for setting up and managing honeypots.

A honeypot tool that simulates an open relay to capture and analyze spam

A medium-interaction PostgreSQL honeypot with configurable settings

A nodejs web application honeypot designed for small environments.

SMTP Honeypot with custom modules for different modes of operation.

A honeypot system that allows you to set up a decoy API to detect and analyze potential security threats.

PINNED