Pasithea has a built in install script for easy installs on Ubuntu machines. 1. Run the install script† $ cd PasitheaHoneypot/src $ sudo ./install.sh The script will now run the apt-get application manager and install the required dependencies. You will eventually be prompted to enter the port number you would like Pasithea to run on. Please enter the port number you would like to configure the APIhp on. Press Enter to default to 8080 <your port number here> The install script will automatically compile the Java for you, and create a seperate script that will run the server for you. 3. Run the server! First, you must make the new script executable: $ sudo chmod +x runAPIrest.sh Then, run the server! $ sudo ./runAPIrest.sh After Pasithea has been deployed, any attempt on the API Honeypot will be logged in a '~' delimited log file named API.log in the src folder. If you would like to run Paisthea in the background, check out screen! If you would like to have Paisthea run on boot add the path to your runAPIrest.sh file to your /etc/rc.local file. † NOTE: this install script will attempt to install the nessecary dependencies for Pasithea as we
FEATURES
ALTERNATIVES
Distributed low interaction honeypot with Agent/Master design supporting various protocol handlers.
Apache 2 based honeypot for detecting and blocking Struts CVE 2017-5638 exploit with added support for content disposition filename parsing vulnerability.
A full featured script to visualize statistics from a Shockpot honeypot, based on Kippo-Graph and utilizing various PHP libraries.
SHIVA: Spam Honeypot with Intelligent Virtual Analyzer for capturing and analyzing spam data.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.