Portlurker is a port listener and honeypot written in Rust, featuring protocol guessing, safe string display, and rudimentary SQLite logging. To install, ensure you have the latest stable version of rustc & Cargo, install libsqlite3-dev for SQLite logging support, and configure the YAML-formatted config file. Running the project requires building with cargo build and executing with cargo run.
Common questions about Portlurker including features, pricing, alternatives, and user reviews.
Portlurker is Port listener / honeypot in Rust with protocol guessing, safe string display and rudimentary SQLite logging. It is a Security Operations solution designed to help security teams with Sqlite.
Portlurker is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/bartnv/portlurker/ for download and installation instructions.
Popular alternatives to Portlurker include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
Portlurker is for security teams and organizations that need Sqlite. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
A Python web application that provides statistical analysis and visualization for Glastopf honeypot data by connecting to the honeypot's SQLite database.
Cloud-native deception platform deploying dynamic security canaries
AI-powered deception platform using honeypots to detect & disrupt attacks