Pasithea Logo

Pasithea

A honeypot system that allows you to set up a decoy API to detect and analyze potential security threats.

4
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

Pasithea Description

Pasithea has a built in install script for easy installs on Ubuntu machines. 1. Run the install script† $ cd PasitheaHoneypot/src $ sudo ./install.sh The script will now run the apt-get application manager and install the required dependencies. You will eventually be prompted to enter the port number you would like Pasithea to run on. Please enter the port number you would like to configure the APIhp on. Press Enter to default to 8080 <your port number here> The install script will automatically compile the Java for you, and create a seperate script that will run the server for you. 3. Run the server! First, you must make the new script executable: $ sudo chmod +x runAPIrest.sh Then, run the server! $ sudo ./runAPIrest.sh After Pasithea has been deployed, any attempt on the API Honeypot will be logged in a '~' delimited log file named API.log in the src folder. If you would like to run Paisthea in the background, check out screen! If you would like to have Paisthea run on boot add the path to your runAPIrest.sh file to your /etc/rc.local file. † NOTE: this install script will attempt to install the nessecary dependencies for Pasithea as we

Pasithea FAQ

Common questions about Pasithea including features, pricing, alternatives, and user reviews.

Pasithea is A honeypot system that allows you to set up a decoy API to detect and analyze potential security threats.. It is a Security Operations solution designed to help security teams with Server.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Docker HTTP API Emulator Logo

Emulates Docker HTTP API with event logging and AWS deployment script.

0
Dicompot Logo

A DICOM server with a twist, blocking C-STORE attempts for protection but logging them.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox