Packages that act as 'honeypots', ie programs that appear to be vulnerable services used to attract hackers into a trap.
Tool count: 22
Name | Version | Description | Category | Website |
---|---|---|---|---|
antiransom | 5 | A tool capable of detect and stop attacks of Ransomware using honeypots. | windows defensive honeypot | |
artillery | 1:357.805a5d8 | A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system. | defensive honeypot | |
beeswarm | 1183.db51ea0 | Honeypot deployment made easy http://www.beeswarm-ids.org/ | honeypot | |
bluepot | 0.2 | A Bluetooth Honeypot written in Java, it runs on Linux | bluetooth honeypot | |
conpot | 0.6.0 | ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems url="http://conpot.org" | honeypot | |
epicwebhoneypot | 2.0a | Tool which aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host. | webapp defensive honeypot | |
fakeap | 0.3.2 | Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames. | honeypot | |
fakenetbios | 7.b83701e | A family of tools designed to simulate Windows hosts (NetBIOS) on a LAN. | spoof honeypot networking | |
fiked | 0.0.5 | FakeIKEd, or fiked for short, is a fake IKE daemon supporting just enough of the standards and Cisco extensions to attack commonly found insecure Cisco VPN PSK+XAUTH based IPsec authentication setups in what could be described as a semi MitM attack. Fiked can impersonate a VPN gateway’s IKE responder in order to capture XAUTH login credentials; it doesn’t currently do the client part of full MitM. | honeypot | |
heartbleed-honeypot | 0.1 | Script that listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's | honeypot | |
honeyd | 337.a0f3d64 | A small daemon that creates virtual hosts on a network. | honeypot | |
honeypy | 600.6ca3d6e | A low interaction Honeypot. | honeypot defensensive | |
honssh | 204.821ce87 | A high-interaction Honey Pot solution designed to log all SSH communications between a client and server. | honeypot | |
hpfeeds | 414.34bf4d4 | Honeynet Project generic authenticated datafeed protocol. | honeypot networking | |
inetsim | 1.3.2 | A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples. | defensive honeypot | |
kippo | 287.b9eb06a | A medium interaction SSH honeypot designed to log brute force attacks and most importantly, the entire shell interaction by the attacker. | honeypot | |
pshitt | 23.dae7931 | A lightweight fake SSH server designed to collect authentication data sent by intruders. | honeypot | |
python2-hpfeeds | 414.34bf4d4 | Honeynet Project generic authenticated datafeed protocol. | honeypot networking | |
snare | 188.b17fdfe | Super Next generation Advanced Reactive honEypot. SNARE is a web application honeypot sensor attracting all sort of maliciousness from the Internet. | honeypot webapp | |
ssh-honeypot | 113.4bda71c | Fake sshd that logs ip addresses, usernames, and passwords. | honeypot | |
wifi-honey | 1.0 | A management tool for wifi honeypots. | honeypot wireless | |
wordpot | 44.e96889b | A Wordpress Honeypot. | honeypot defensive |