YALIH YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signature, anomaly and pattern matching techniques. * Suspecious URL collection from malicious website databases (three databases) * URL collection through Bing API * Suspecious URL collection from your inbox and SPAM folder through pop3 and IMAP protocol * Javascript extraction, de-obfuscation and de-minification of scripts embedded within a website * Referrer Emulation and redirection handling * Cookies and session handling * Browser and browser agent and OS emulation * Proxy capabilities to detect Geo-location and/or IP cloacking attacks * Signature detection using ClamAV antivirus database * Anomaly and pattern matching detection through Yara (http://plusvic.github.io/yara/) * Automated Yara signature generation =================================== Easy Installation and documentation ==================================== Authors/Contributors: * Victoria University of Wellington * Masood Mansoori - masood.mansoori@gmail.com * Singapore Polytechnic * Lai Qi Wei - laiqiwei30@hotmail.com
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A honeypot daemon project for processing, filtering, and redirecting incoming traffic to a sandbox environment.
The DShield Raspberry Pi Sensor is a tool that turns a Raspberry Pi into a honeypot to collect and submit security logs to the DShield project for analysis.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.