WAPot Logo

WAPot

0
Free
Visit Website

A honeypot that can be used to observe traffic directed at wireless home routers. The honeypot will emulate a Belkin N300 Home Wireless router with the default setup. These routers are shipped with no password set for the administrative interface by default. Usage: $ cd WAPot $ go run main.go The idea is to expose this interface externally on port 8080 or 8000 to appear as if an administrative port has been opened to the internet.

FEATURES

ALTERNATIVES

High-performance remote packet capture and collection tool used for forensic analysis in cloud workloads.

A suite for man in the middle attacks, featuring sniffing of live connections, content filtering, and protocol dissection.

Linux packet crafting tool for testing IDS/IPS and creating attack signatures.

A framework for creating and executing pynids-based decoders and detectors of APT tradecraft

A fast and simple recursive content discovery tool

Passive SSL client fingerprinting tool using handshake analysis.

An analyzer for parsing GQUIC traffic in Zeek, supporting versions Q039 to Q046, with a fingerprinting method named 'CYU' for detecting anomalous GQUIC traffic.

Makes output from the tcpdump program easier to read and parse.