Trapster Community is a low-interaction honeypot designed for internal network deployment. The tool operates by simulating network services to detect and monitor suspicious activities, utilizing Python's asyncio for non-blocking operations. Key functionalities include: - Service simulation for intrusion detection - Configurable service deployment through trapster.conf - HTTP honeypot engine with AI response capabilities - Website cloning functionality using YAML configuration - Multiple logging options including file-based and API-based logging - Docker deployment support - Customizable logging formats for connection, data, login, and query events The system supports various deployment methods including manual installation, system service configuration, and containerized deployment through Docker.
FEATURES
SIMILAR TOOLS
A web-based visualization tool that displays statistics and generates charts from Shockpot honeypot data stored in PostgreSQL databases.
An Apache 2 based honeypot with detection capabilities specifically designed to identify and analyze Struts CVE-2017-5638 exploitation attempts.
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
A plugin repository that extends the Honeycomb honeypot framework with additional features and capabilities for enhanced threat detection and analysis.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.