SSHoney is an SSH honeypot designed to log SSH connection attempts on a given port. It listens on a non-privileged port (default 2222), pretends to be an SSH server, and logs connection details like IP, username, password, and SSH client version to stdout, syslog, or a specified log file. Basic setup involves installing the source and binary, ensuring the binary path is in the system path, and generating a host key.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A Docker-based honeypot network implementation featuring cowrie and dionaea honeypots with centralized event collection, geolocation enrichment, and real-time attack visualization.
A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server
A honeypot tool to detect and log CVE-2019-19781 scan and exploitation attempts.
A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.
A web-based visualization tool that displays statistics and generates charts from Shockpot honeypot data stored in PostgreSQL databases.
A WordPress plugin that logs failed login attempts to help monitor unauthorized access attempts on WordPress websites.
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.