Portlurker is a port listener and honeypot written in Rust, featuring protocol guessing, safe string display, and rudimentary SQLite logging. To install, ensure you have the latest stable version of rustc & Cargo, install libsqlite3-dev for SQLite logging support, and configure the YAML-formatted config file. Running the project requires building with cargo build and executing with cargo run.
FEATURES
SIMILAR TOOLS
A free DNS recursive service that blocks malicious host names and protects user privacy.
A suite for man in the middle attacks, featuring sniffing of live connections, content filtering, and protocol dissection.
A blog sharing packet capture files and malware samples for training and analysis, with archived posts and traffic analysis exercises.
NBD is a user-space network protocol for sharing block devices over a network, allowing clients to access block devices on a server as if they were local.
A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.
Suricata offers real-time intrusion detection, intrusion prevention, and network monitoring.
Snort is an open source intrusion prevention system that uses rules to detect and prevent malicious network activity.
WireGuard is a fast, simple, and secure VPN that uses cutting-edge cryptography, designed for ease of use and performance.
A Bluetooth 5 and 4.x sniffer using TI CC1352/CC26x2 hardware with advanced features and Python-based host-side software.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.