OWA Honeypot Logo

OWA Honeypot

0
Free
Visit Website

A basic Flask-based Outlook Web App (OWA) honeypot designed for cybersecurity enthusiasts to experiment with OWA-specific threat scenarios. The tool simulates an OWA environment to attract and analyze potential malicious activities, providing valuable insights for defense strategies. To install, clone the GitHub repository, set up a Python3 virtual environment, install dependencies, and run the 'owa_pot.py' script. Caution: Running the honeypot on port 80 is not recommended for internet-facing deployments. For more information, refer to the write-up at https://joda32.github.io/2019/06/11/owa-plus-pastebin.html.

FEATURES

ALTERNATIVES

GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

Building Honeypots for Industrial Networks using Honeyd and simulating SCADA, DCS, and PLC architectures.

A tool to bypass Content Security Policy (CSP) restrictions

OpenCanary is a multi-protocol network honeypot with low resource requirements and alerting capabilities.

A low interaction honeypot for detecting CVE-2018-0101 vulnerability in Cisco ASA component.

Django App for the SSH Honeypot called 'kippo'

A modular web application honeypot framework with automation and logging capabilities.

Medium interaction SSH Honeypot with multiple virtual hosts and sandboxed filesystems.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved