Honeypot that emulates several protocols (incl. SSH, telnet, SMTP, HTTP, SSL and SIP)
☆52Feb 19, 2016Updated 10 years ago
Alternatives and similar repositories for honeypot
Users that are interested in honeypot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆37Jul 10, 2015Updated 10 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago
- Project HMS☆10Jun 11, 2018Updated 7 years ago
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- ☆12May 6, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Generic Low Interaction Honeypot☆300Updated this week
- Practice Go programming and implement CobaltStrike's Beacon in Go☆14Mar 19, 2020Updated 6 years ago
- Go package for fexecve(3) and execveat(2)☆15Mar 4, 2026Updated last month
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- C++ to OpenCL C Source-to-source Translation☆13Feb 15, 2014Updated 12 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆60Dec 10, 2014Updated 11 years ago
- ☆25Aug 25, 2015Updated 10 years ago
- A SSH honeypot written in Go☆13Dec 12, 2013Updated 12 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Simple SSH brute-forcer written in Go☆24May 29, 2016Updated 9 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- ☆16May 22, 2015Updated 10 years ago
- MISP website (hugo-based)☆25Apr 16, 2026Updated 2 weeks ago
- Elasticsearch honeypot written in Python with Bottle framework☆18Apr 12, 2019Updated 7 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 10 years ago
- Simple High Interaction Honeypot Solution for SMB protocol☆50Mar 28, 2021Updated 5 years ago
- Home of the dionaea honeypot☆801Aug 1, 2024Updated last year
- This repo is for demonstration purposes only.☆15Oct 20, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Identifies phishing websites using a treebag model☆22Oct 14, 2020Updated 5 years ago
- IMAP or SMTP honeypot written in Golang☆26Apr 22, 2022Updated 4 years ago
- 关于蜜罐的一些微小的统计工作☆30Aug 26, 2020Updated 5 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- plugin of ida with pin☆48Jan 25, 2021Updated 5 years ago
- An SMTP Honeypot☆281Dec 30, 2025Updated 4 months ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- python wrapper for the nfdump cli application☆21Apr 8, 2021Updated 5 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Mar 24, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The NoSQL Honeypot Framework☆103Oct 17, 2023Updated 2 years ago
- IDA SIG files for multiarch uClibc library☆38Jun 20, 2018Updated 7 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 9 years ago
- Advanced Honeypot framework.☆1,299Oct 9, 2023Updated 2 years ago
- Telnet Honeypot☆162Mar 5, 2019Updated 7 years ago
- Jeopardy CTF platform☆12Jan 3, 2023Updated 3 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 11 years ago