SNARE Logo

SNARE

0
Free
Visit Website

SNARE is a web application honeypot sensor attracting all sort of maliciousness from the Internet. Documentation can be found here. Basic Concepts: Surface first. Focus on the attack surface generation. Sensors and masters. Lightweight collectors (SNARE) and central decision maker (tanner). Getting started: You need Python3.6 to run SNARE. This was tested with a recent Ubuntu based Linux. Steps to setup: Get SNARE: git clone https://github.com/mushorg/snare.git and cd snare [Optional] Make virtual environment: python3 -m venv venv [Optional] Activate virtual environment: . venv/bin/activate Note: Do not use sudo with below commands if you're running snare in virtual environment. Install requirements: sudo pip3 install -r requirements.txt Setup snare: sudo python3 setup.py install Clone a page: sudo clone --target http://example.com --path <path to base dir> Run SNARE: sudo snare --port 8080 --page-dir example.com --path <path to base dir> Test: Visit http://localhost:8080/index.html Optionally have your own tanner service running. [Note : Cloner clones the whole website, to restrict to a desired depth of cloning.

FEATURES

ALTERNATIVES

A tool for testing subdomain takeover possibilities at a mass scale.

HellPot is an endless honeypot that sends unruly HTTP bots to hell with grave consequences.

A script for setting up a dionaea and kippo honeypot using Docker images.

SSH honeypot with rich features for recording and analyzing malicious activities.

Create and monitor fake HTTP endpoints automatically with Honeyku, deployable on Heroku or your own server.

A modified version of OpenSSH deamon forwarding commands to Cowrie for logging brute force attacks and shell interactions.

A honeypot for the Log4Shell vulnerability (CVE-2021-44228) with various detection and logging features.

An extensible and open-source system for running, monitoring, and managing honeypots with advanced features.