A Python-based telnet server that functions as a honeypot specifically designed to attract and capture IoT malware. The tool emulates a shell environment to deceive attackers and botnet operators into connecting and attempting to deploy malicious binaries. It operates using a client/server architecture that allows for distributed deployment and centralized monitoring. The honeypot automatically captures and analyzes botnet binaries that are downloaded or executed during attack attempts. This enables security researchers and organizations to study IoT malware behavior, attack patterns, and payload characteristics. The system logs connection attempts, commands executed by attackers, and any malicious files transferred during the session. This data collection helps in understanding current IoT threat landscapes and developing appropriate countermeasures.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
A honeypot tool to detect and log CVE-2019-19781 scan and exploitation attempts.
An Apache 2 based honeypot with detection capabilities specifically designed to identify and analyze Struts CVE-2017-5638 exploitation attempts.
A plugin repository that extends the Honeycomb honeypot framework with additional features and capabilities for enhanced threat detection and analysis.
A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.