Shockpot-Frontend is a web-based visualization tool designed to display statistics and data from Shockpot honeypots. The tool requires a specific version of Shockpot that logs data to PostgreSQL databases for proper functionality. The frontend provides comprehensive statistical analysis and graphical representations of honeypot activity through various visualization components. It incorporates multiple libraries including Libchart PHP for chart generation, QGoogleVisualizationAPI for Google's Visualization API integration, RedBeanPHP for database operations, and MaxMind with geoPlugin for geolocation services. The tool is built on PHP and requires version 5.3.4 or higher along with specific packages including libapache2-mod-php5, php5-pgsql, php5-gd, and php5-curl. Installation involves downloading the source code, configuring database connections, and setting appropriate file permissions for the generated-graphs directory. Shockpot-Frontend is based on the Kippo-Graph project and provides similar functionality for visualizing honeypot data through web interfaces. The tool generates various charts and graphs to help security professionals analyze attack patterns, geographic distributions, and other relevant metrics from honeypot deployments.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A honeypot tool to detect and log CVE-2019-19781 scan and exploitation attempts.
An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.
An Apache 2 based honeypot with detection capabilities specifically designed to identify and analyze Struts CVE-2017-5638 exploitation attempts.
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
A Docker-based honeypot network implementation featuring cowrie and dionaea honeypots with centralized event collection, geolocation enrichment, and real-time attack visualization.
A plugin repository that extends the Honeycomb honeypot framework with additional features and capabilities for enhanced threat detection and analysis.
A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.