YALIH YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signature, anomaly and pattern matching techniques. * Suspecious URL collection from malicious website databases (three databases) * URL collection through Bing API * Suspecious URL collection from your inbox and SPAM folder through pop3 and IMAP protocol * Javascript extraction, de-obfuscation and de-minification of scripts embedded within a website * Referrer Emulation and redirection handling * Cookies and session handling * Browser and browser agent and OS emulation * Proxy capabilities to detect Geo-location and/or IP cloacking attacks * Signature detection using ClamAV antivirus database * Anomaly and pattern matching detection through Yara (http://plusvic.github.io/yara/) * Automated Yara signature generation =================================== Easy Installation and documentation ==================================== Authors/Contributors: * Victoria University of Wellington * Masood Mansoori - masood.mansoori@gmail.com * Singapore Polytechnic * Lai Qi Wei - laiqiwei30@hotmail.com
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
A subset of the Modern Honey Network project set up to run in docker, including hpfeeds broker, cowrie honeypot, and dionaea honeypot.
An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.
A honeypot tool to detect and log CVE-2019-19781 scan and exploitation attempts.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.