Trending repositories for topic honeypot
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, ...
An easy to set up and use SSH honeypot, a fake SSH server that lets anyone in and logs their activity
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, advanced methods, and efficient sniffers. Ideal for cybersecurity...
Database security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("tra...
Tutorial on how to create your own honeypot erc20/ bep20 tokens and listing to Uniswap
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, ...
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
An easy to set up and use SSH honeypot, a fake SSH server that lets anyone in and logs their activity
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, advanced methods, and efficient sniffers. Ideal for cybersecurity...
Database security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("tra...
Tutorial on how to create your own honeypot erc20/ bep20 tokens and listing to Uniswap
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, ...
An easy to set up and use SSH honeypot, a fake SSH server that lets anyone in and logs their activity
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, advanced methods, and efficient sniffers. Ideal for cybersecurity...
Database security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("tra...
Tutorial on how to create your own honeypot erc20/ bep20 tokens and listing to Uniswap
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, ...
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
An easy to set up and use SSH honeypot, a fake SSH server that lets anyone in and logs their activity
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, advanced methods, and efficient sniffers. Ideal for cybersecurity...
Database security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("tra...
Tutorial on how to create your own honeypot erc20/ bep20 tokens and listing to Uniswap
HellPot is a cross-platform portal to endless suffering meant to punish unruly HTTP bots.
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, ...
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
An easy to set up and use SSH honeypot, a fake SSH server that lets anyone in and logs their activity
Tutorial on how to create your own honeypot erc20/ bep20 tokens and listing to Uniswap
A dockerized fake SSH server honeypot written in Go that logs login attempts.
A secure low code honeypot framework, leveraging AI for System Virtualization.
A collection of malware samples caught by several honeypots i manage
Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, advanced methods, and efficient sniffers. Ideal for cybersecurity...
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
HellPot is a cross-platform portal to endless suffering meant to punish unruly HTTP bots.
Tutorial on how to create your own honeypot erc20/ bep20 tokens and listing to Uniswap
🛜 T-Pot Mobile - The All In One Wireless Honeypot Solution 🍯
A dockerized fake SSH server honeypot written in Go that logs login attempts.
Step By Step Guide to How to Create Honeypot Token and list them on PANCAKE SWAP.
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, ...
Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hosted alternative to GreyNoise.
🌐🔍 Red Network Tool is a tool for network exploration and info finding.
An awesome list of resources on deception-based security with honeypots and honeytokens
Blockchain Threat Intelligence Sharing Platform(区块链威胁情报共享平台)
A secure low code honeypot framework, leveraging AI for System Virtualization.
PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
Guide to creating your own honeypot ERC-20 or BEP-20 tokens with a listing on Uniswap or PancakeSwap
HTTP honeypot to punish and educate unruly web crawlers, written in Rust (🚀)
✅🚀Tutorial on how to create your own honeypot erc20/ bep20 tokens and listing to Uniswap
Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for precise detection and notification specifically for honeyservices ...
Step By Step Guide to How to Create Honeypot Token and list them on PANCAKE SWAP.
Multi-services Asynchronous Honeypot Solution with real-time threat detection
Brute an application that monitors authentication attempts on your server that uses OpenSSH or any protocol. May not be practical, but it is cool.
Guide to creating your own honeypot ERC-20 or BEP-20 tokens with a listing on Uniswap or PancakeSwap
Guide to creating your own honeypot ERC-20 or BEP-20 tokens with a listing on Uniswap or PancakeSwap
Guide to creating your own honeypot ERC-20 or BEP-20 tokens with a listing on Uniswap or PancakeSwap
Guide to creating your own honeypot ERC-20 or BEP-20 tokens with a listing on Uniswap or PancakeSwap
HellPot is a cross-platform portal to endless suffering meant to punish unruly HTTP bots.
A secure low code honeypot framework, leveraging AI for System Virtualization.
A dockerized fake SSH server honeypot written in Go that logs login attempts.
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
An easy to set up and use SSH honeypot, a fake SSH server that lets anyone in and logs their activity
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, ...
A collection of malware samples caught by several honeypots i manage
Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, advanced methods, and efficient sniffers. Ideal for cybersecurity...
Database security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("tra...
🍯 Unobtrusive and flexible spam protection for Rails apps
Tutorial on how to create your own honeypot erc20/ bep20 tokens and listing to Uniswap
An ssh honeypot with the XZ backdoor. CVE-2024-3094
Modular web-application honeypot platform built using go and gin
Tutorial on how to create your own honeypot erc20/ bep20 tokens and listing to Uniswap
Multi-services Asynchronous Honeypot Solution with real-time threat detection
HellPot is a cross-platform portal to endless suffering meant to punish unruly HTTP bots.
An ssh honeypot with the XZ backdoor. CVE-2024-3094
A dockerized fake SSH server honeypot written in Go that logs login attempts.
PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.
A compact and portable WiFi reconnaissance suite based on the ESP8266
A secure low code honeypot framework, leveraging AI for System Virtualization.
This is a repository containing Python code examples for educational purposes in the field of cybersecurity. The code covers topics such as malware, security strategies, and more. It is a useful resou...
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, ...
Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, advanced methods, and efficient sniffers. Ideal for cybersecurity...