Troje Logo

Troje

0
Free
Updated 11 March 2025
Visit Website

Troje is a honeypot that creates a real environment within a physical or virtual machine using lxc containers. These containers are created on the first connection with the desired service, such as SSH. Troje passes all traffic between the service and the 'attacker's' own attack vector, monitoring all traffic within the lxc container and recording changes to the drives. Note: This is a proof of concept and has not been thoroughly tested.

FEATURES

SIMILAR TOOLS

A list of services and how to claim (sub)domains with dangling DNS records.

A tool to bypass Content Security Policy (CSP) restrictions

A tool for generating permutations, alterations and mutations of subdomains and resolving them

A low-interaction honeypot for detecting and analyzing security threats

Apache 2 based honeypot for detecting and blocking Struts CVE 2017-5638 exploit with added support for content disposition filename parsing vulnerability.

A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server

A honeypot mimicking Tomcat manager endpoints to log requests and save attacker's WAR files for analysis.

SSH Honeypot written in Go that records commands and IP addresses of attempted logins.

A honeypot system that allows you to set up a decoy API to detect and analyze potential security threats.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved