Probably one of the smallest and simplest web honeypots out there, requiring a web server running Apache, the ability to change file permissions, basic knowledge of HTML and PHP, and about 30 minutes of free time. For automated alert generation, access to a Log Manager / SIEM is recommended. Installation involves uploading the /phpmyadmin-interactive/ folder to the root of the web directory, changing the folder name to /phpmyadmin/, adjusting permissions on /phpmyadmin/log.txt, ensuring all contents are owned by the 'web user', and adding specific lines to the robots.txt file to prevent indexing.
FEATURES
SIMILAR TOOLS
An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.
Apache 2 based honeypot for detecting and blocking Struts CVE 2017-5638 exploit with added support for content disposition filename parsing vulnerability.
A low Interaction Client honeypot designed to detect malicious websites through signature, anomaly and pattern matching techniques.
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.