VerySimpleHoneypot Logo

VerySimpleHoneypot

0
Free
Updated 11 March 2025
Visit Website

Honeypot for analyzing data. Run ./bin/smsids.py as sudo to start all services. Debian prerequisites: python2, pip, setuptools, gcc. Modules needed: sys, psutil. All modules are normally installed using pip, like pip install --upgrade. Services can be added in the smsids.py source file, just add an array to the services like ["HTTPS", 443, RE.http_200]. Service name, port, response. Response can be normal text. Logging: per default, all events get logged into syslog using a 'Leef' compliant format.

FEATURES

SIMILAR TOOLS

A tool to identify potential subdomain takeovers by checking if a CNAME record resolves to the scope address.

A powerful tool for finding and exploiting subdomain takeover vulnerabilities

Uploader honeypot designed to look like poor website security.

A multiarch honeypot platform supporting 20+ honeypots and offering visualization options and security tools.

A security platform that automates the deployment and management of security canaries across cloud infrastructure to detect potential intrusions and unauthorized access.

Commercial

A high-interaction honeypot solution for detecting and analyzing SMB-based attacks

Modular honeypot based on Python with support for Siemens S7 protocol.

Honey-Pod for SSH that logs username and password tries during brute-force attacks.

A Go-based honeypot server for detecting and logging attacker activity

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved