SHIVA Spampot Logo

SHIVA Spampot

0
Free
Visit Website

SHIVA: Spam Honeypot with Intelligent Virtual Analyzer, is an open but controlled relay Spam Honeypot (SpamPot). SHIVA is written in Python 3 and will eventually use Elasticsearch/OpenSearch for storing information parsed from the received spams. Analysis of data captured can be used to get information of phishing attacks, scamming campaigns, malware campaigns, spam botnets, etc. Originally, SHIVA was initially developed during 2012/2013 and used the Lamson framework in the background. However, due to lack of time, the project was not updated regularly. The old code was complicated and had a lot of monkey-patching which made it harder to maintain. Current efforts will focus on simplifying the codebase, and adding features like easy deployment via Docker, better documentation, Elasticsearch integration for search/analysis, threat intel service lookups, updated OSS licence, etc. Components The spampot is divided into two components: Receiver and Analyzer. The decision was taken to ensure that both the components keep wor

FEATURES

ALTERNATIVES

GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

Script for turning a Raspberry Pi into a Honey Pot Pi with various monitoring and logging capabilities.

An LLM-based honeypot file system creator that generates realistic file systems and configurations to lure attackers and improve analyst engagement.

A directory traversal fuzzer for finding and exploiting directory traversal vulnerabilities.

A DNS server for executing DNS Rebinding attacks

Troje is a honeypot that creates a realistic environment within lxc containers to monitor and record traffic and changes to drives.

Python web application honeypot with vulnerability type emulation and modular design.

Honeypot platform for tracking and monitoring UDP-based DDoS attacks with support for various honeypot services.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved