A comprehensive dashboard for managing and monitoring honeypots with detailed information on attack attempts and connections.
Listens on port 3389, on a new connection it'll create a session & assign a virtual machine from a pool to that session. After 300 seconds (default) of the session being opened or 30 seconds (default) of no activity, the connection will be closed, and the session will be terminated. It stores a copy of the disk & a full pcap, runs Suricata against the pcap, and saves the output with the disk image and the pcap. Requirements: qemu, libvirt, Python3.7, Suricata, tcpdump. Suricata installation steps included.
A comprehensive dashboard for managing and monitoring honeypots with detailed information on attack attempts and connections.
Bluetooth Honeypot with monitoring capabilities
A low to medium interaction honeypot with a variety of plugins for cybersecurity monitoring.
WordPress honeypot tool running in a Docker container for monitoring access attempts.
A honeypot agent for running honeypots with service and data at threatwar.com.
A tool to generate a PNG image containing a XSS payload