Spam Honeypot Tool Simple Open Relay Simulator for Spam Capture and Analysis Installation Requirements on Debian (base) 6.x, 7.x Perl 5.10.1 CPAN Modules IO::Socket Mail::MboxParser LWP::Simple LWP::UserAgent experimental DBI DBD::mysql Digest::MD5::File MySQL Server Installation Linux Debian installation instructions Execution Once you have all the modules installed you just have to create a database called spampot or whatever you wish to name it, create a user with password and then assign the name of your database to the user you've already created. Please set this values on the spampot-ng.conf file. In order to run the tool you have to run it with sudo or using a wrapper as authbind, here are the instructions # sudo perl spampot-ng.pl # authbind --deep perl spampot-ng.pl Author Miguel Raúl Bautista Soria
FEATURES
SIMILAR TOOLS
A plugin repository that extends the Honeycomb honeypot framework with additional features and capabilities for enhanced threat detection and analysis.
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
A Docker-based honeypot network implementation featuring cowrie and dionaea honeypots with centralized event collection, geolocation enrichment, and real-time attack visualization.
A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.
An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
An Apache 2 based honeypot with detection capabilities specifically designed to identify and analyze Struts CVE-2017-5638 exploitation attempts.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.