Sticky Elephant is a medium-interaction PostgreSQL honeypot. It can be configured using a YAML file that defines its behavior. Configuration options include log path, port, host, debug mode, and HPFeeds settings. Sticky Elephant can be installed as a gem or cloned from the repository and run using the `sticky_elephant` command. For more information, see the sticky_elephant.conf configuration file.
FEATURES
ALTERNATIVES
A crawler-based low-interaction client honeypot for exposing website threats.
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
SMTP honeypot tool with configurable response messages, email storage, and automatic information extraction.
PINNED
![InfoSecHired Logo](/_next/image?url=https%3A%2F%2Fkcjlih8bwjd7vpzd.public.blob.vercel-storage.com%2Finfosechired-U6U90c3Q6Cba3cSOZeZKsqvzJIuopf.webp&w=96&q=75)
InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
![Fabric Platform by BlackStork Logo](/_next/image?url=https%3A%2F%2Fkcjlih8bwjd7vpzd.public.blob.vercel-storage.com%2Ffabric-platform-by-blackstork-phi1uhUgEJZE9Ya8iuCSaCo0snAElq.webp&w=96&q=75)
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
![Mandos Brief Newsletter Logo](/_next/image?url=https%3A%2F%2Fkcjlih8bwjd7vpzd.public.blob.vercel-storage.com%2Fmandos-brief-newsletter-mandos-brief-newsletter-bVEIOy0EGaEW4CfsFNgqMc4Ck7DBMJ.webp&w=96&q=75)
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
![System Two Security Logo](/_next/image?url=https%3A%2F%2Fkcjlih8bwjd7vpzd.public.blob.vercel-storage.com%2Fsystem-two-security-O0dnMtVxvDr4lsOQN548cxgvMBaChN.webp&w=96&q=75)
System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
![Aikido Security Logo](/_next/image?url=https%3A%2F%2Fkcjlih8bwjd7vpzd.public.blob.vercel-storage.com%2Faikido-y5FboqNnnVz6G816AUVeOgyCWu9CLQ.webp&w=96&q=75)
Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
![Permiso Logo](/_next/image?url=https%3A%2F%2Fkcjlih8bwjd7vpzd.public.blob.vercel-storage.com%2Fpermiso-6PYopYA8QMCIQw6oVuJQct9dodan2Y.webp&w=96&q=75)
Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
![Wiz Logo](/_next/image?url=https%3A%2F%2Fkcjlih8bwjd7vpzd.public.blob.vercel-storage.com%2Fwiz-HVmg8jGNvHcayd5g99UUUf8jHoFZRK.webp&w=96&q=75)
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
![Adversa AI Logo](/_next/image?url=https%3A%2F%2Fkcjlih8bwjd7vpzd.public.blob.vercel-storage.com%2Fadversa-ai-UnkKaoTvjZuLWZDiYE44HHO7bqy7AH.webp&w=96&q=75)
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.