YALIH YALIH Logo

YALIH YALIH

0
Free
Updated 11 March 2025
Visit Website

YALIH YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signature, anomaly and pattern matching techniques. * Suspecious URL collection from malicious website databases (three databases) * URL collection through Bing API * Suspecious URL collection from your inbox and SPAM folder through pop3 and IMAP protocol * Javascript extraction, de-obfuscation and de-minification of scripts embedded within a website * Referrer Emulation and redirection handling * Cookies and session handling * Browser and browser agent and OS emulation * Proxy capabilities to detect Geo-location and/or IP cloacking attacks * Signature detection using ClamAV antivirus database * Anomaly and pattern matching detection through Yara (http://plusvic.github.io/yara/) * Automated Yara signature generation =================================== Easy Installation and documentation ==================================== Authors/Contributors: * Victoria University of Wellington * Masood Mansoori - masood.mansoori@gmail.com * Singapore Polytechnic * Lai Qi Wei - laiqiwei30@hotmail.com

FEATURES

SIMILAR TOOLS

A tool for embedding XXE/XML exploits into different filetypes

A high-interaction honeypot system supporting the Redis protocol.

A honeypot daemon project for processing, filtering, and redirecting incoming traffic to a sandbox environment.

Docker-based honeypot setup with detailed installation and configuration instructions.

A low to medium interaction honeypot with a variety of plugins for cybersecurity monitoring.

The DShield Raspberry Pi Sensor is a tool that turns a Raspberry Pi into a honeypot to collect and submit security logs to the DShield project for analysis.

A project providing honeypots for embedded device vulnerabilities with support for AWS integration and JSON output.

A simple web-based interface for subdomain enumeration using the subfinder tool.

A webapp for displaying statistics about your kippo SSH honeypot.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved