Twisted Honeypots Logo

Twisted Honeypots

A Python-based honeypot service for SSH, FTP, and Telnet connections

87
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

Twisted Honeypots Description

Twisted-honeypots SSH, FTP and Telnet honeypot services based on the Twisted engine for Python 3. All credentials are stored on a local MySQL database. This will create easily (and painlessly) very good dictionaries to use for pentesting. Install: $ git clone https://github.com/lanjelot/twisted-honeypots /opt/twisted-honeypots $ cd /opt/twisted-honeypots $ sudo ./install.sh && ./setup-db.sh Usage: To start/stop the services: $ sudo ./start.sh $ sudo ./stop.sh To monitor the current execution: $ ./monitor.sh To extract the login/passwords in a wordlist sorted by best popularity: $ source vars.sh # logins $ echo "select distinct login from pot group by login order by count(login) desc" | mysql -rs -u${MYSQL_USER} -p${MYSQL_PWD} ${MYSQL_DB} # passwords $ echo "select distinct password from pot group by password order by count(password) desc" | mysql -rs -u${MYSQL_USER} -p${MYSQL_PWD} ${MYSQL_DB}

Twisted Honeypots FAQ

Common questions about Twisted Honeypots including features, pricing, alternatives, and user reviews.

Twisted Honeypots is A Python-based honeypot service for SSH, FTP, and Telnet connections. It is a Security Operations solution designed to help security teams with Mysql, SSH, Telnet.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Heralding Logo

A simple honeypot that collects credentials across various protocols

0
DShield Raspberry Pi Sensor Logo

The DShield Raspberry Pi Sensor is a tool that turns a Raspberry Pi into a honeypot to collect and submit security logs to the DShield project for analysis.

0
fofapro fapro Logo

Fake protocol server simulator supporting 50+ network protocols for deception

0
HoneyWRT Intrusion Detection System Logo

A low interaction Python honeypot designed to mimic various services and ports to attract attackers and log access attempts.

0
Hudinx Logo

Medium interaction SSH honeypot for logging brute force attacks and shell interactions.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox