Honeypot for analyzing data. Run ./bin/smsids.py as sudo to start all services. Debian prerequisites: python2, pip, setuptools, gcc. Modules needed: sys, psutil. All modules are normally installed using pip, like pip install --upgrade. Services can be added in the smsids.py source file, just add an array to the services like ["HTTPS", 443, RE.http_200]. Service name, port, response. Response can be normal text. Logging: per default, all events get logged into syslog using a 'Leef' compliant format.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An Apache 2 based honeypot with detection capabilities specifically designed to identify and analyze Struts CVE-2017-5638 exploitation attempts.
A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
A web-based visualization tool that displays statistics and generates charts from Shockpot honeypot data stored in PostgreSQL databases.
A WordPress plugin that logs failed login attempts to help monitor unauthorized access attempts on WordPress websites.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.