SNARE Logo

SNARE

0
Free
Visit Website

SNARE is a web application honeypot sensor attracting all sort of maliciousness from the Internet. Documentation can be found here. Basic Concepts: Surface first. Focus on the attack surface generation. Sensors and masters. Lightweight collectors (SNARE) and central decision maker (tanner). Getting started: You need Python3.6 to run SNARE. This was tested with a recent Ubuntu based Linux. Steps to setup: Get SNARE: git clone https://github.com/mushorg/snare.git and cd snare [Optional] Make virtual environment: python3 -m venv venv [Optional] Activate virtual environment: . venv/bin/activate Note: Do not use sudo with below commands if you're running snare in virtual environment. Install requirements: sudo pip3 install -r requirements.txt Setup snare: sudo python3 setup.py install Clone a page: sudo clone --target http://example.com --path <path to base dir> Run SNARE: sudo snare --port 8080 --page-dir example.com --path <path to base dir> Test: Visit http://localhost:8080/index.html Optionally have your own tanner service running. [Note : Cloner clones the whole website, to restrict to a desired depth of cloning.

FEATURES

ALTERNATIVES

HoneyThing is a honeypot for Internet of TR-069 things, emulating vulnerabilities and supporting TR-069 protocol.

IMAP-Honey is a honeypot tool for IMAP and SMTP protocols with support for logging to console or syslog.

Modular honeypot based on Python with support for Siemens S7 protocol.

A tool to declutter URL lists for crawling and pentesting

A FTP honeypot tool for detecting and capturing malicious file upload attempts.

A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server

A configurable DNS honeypot with SQLite logging and Docker support.

An Open-source intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue Teamers.

PINNED