SMTP honeypot written in Golang
☆33Aug 9, 2016Updated 9 years ago
Alternatives and similar repositories for honeymail
Users that are interested in honeymail are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NTP logger/honeypot☆55Mar 27, 2014Updated 12 years ago
- IMAP or SMTP honeypot written in Golang☆26Apr 22, 2022Updated 3 years ago
- A SSH honeypot written in Go☆13Dec 12, 2013Updated 12 years ago
- Log4j honeypot to capture payloads within HTTP headers, query parameters and POST requests.☆14Dec 15, 2021Updated 4 years ago
- Spam Honeypot Tool☆27Jun 1, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆27Aug 17, 2021Updated 4 years ago
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- A Wordpress Honeypot☆185Feb 7, 2023Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Jul 5, 2022Updated 3 years ago
- DICOM Honeypot☆27Dec 5, 2025Updated 3 months ago
- An SMTP Honeypot☆280Dec 30, 2025Updated 2 months ago
- IP Whois Golang Package☆32Apr 28, 2020Updated 5 years ago
- Yet another no-frills low-interaction ssh honeypot in Go.☆16Feb 2, 2020Updated 6 years ago
- A credential dumping SSH honeypot with statistics☆14Oct 18, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A framework for the automatic generation of Intelligent-Interaction honeypots using OpenWrt-based firmware.☆11Jun 11, 2022Updated 3 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- dns logger for passive dns collection☆42May 27, 2012Updated 13 years ago
- teler Resource Collections☆36Updated this week
- collect logs and alerts from 37 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.☆16Aug 15, 2025Updated 7 months ago
- Configuration Extractor for BlackCat Ransomware☆31Mar 18, 2022Updated 4 years ago
- ☆25Mar 22, 2021Updated 5 years ago
- RDP honeypot☆71Jun 6, 2019Updated 6 years ago
- HL7 / FHIR honeypot☆26May 20, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Oct 6, 2020Updated 5 years ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆277Mar 20, 2019Updated 7 years ago
- A simple and effective phpmyadmin honeypot☆68Feb 11, 2018Updated 8 years ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- Source code for the StealthAssist iOS app. Wirelessly connects your iPhone to the Valentine One radar detector.☆16Oct 17, 2015Updated 10 years ago
- a collection of scripts to maintain a server running rtorrent, autodl-irssi, sonarr, radarr, rclone upload to Google Drive, plexdrive, Pl…☆12Aug 26, 2018Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Index all certificates from certificate transparancy into Elasticsearch☆22Nov 22, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated 2 weeks ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Mount python — it's fun, not a typo, and next to pointless!☆50Jun 30, 2014Updated 11 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆139Feb 16, 2026Updated last month