This unfortunately named program listens for incoming ssh connections and logs the IP address, username, and password used by the client. It is a low-interaction honeypot that does not allow malware or attackers to login. Originally written to gather rudimentary intelligence on brute force attacks, it is not meant for production usage. It is commonly used at attack/defend CTFs paired with sshunt: https://github.com/droberson/sshunt To set up, make sure headers/development packages are installed for: libssh, openssl, libjson-c, and libpcap. For Linux, run: apt install libssh-dev libjson-c-dev libpcap-dev libssl-dev Build and run with: make ssh-keygen -t rsa -f ./ssh-honeypot.rsa bin/ssh-honeypot -r ./ssh-honeypot.rsa For OSX (experimental/unsupported), ensure xcode is up to date and install libssh and json-c with brew. Specify MakefileOSX with make: make -f MakefileOSX
FEATURES
SIMILAR TOOLS
Helix is a versatile honeypot designed to mimic the behavior of various protocols including Kubernetes API server, HTTP, TCP, and UDP.
A crawler-based low-interaction client honeypot for exposing website threats.
A honeypot tool to detect and log CVE-2019-19781 scan and exploitation attempts.
A multiarch honeypot platform supporting 20+ honeypots and offering visualization options and security tools.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.