🌵 Build and manage efficient, scalable workflows with Prickly, designed to simplify your project tracking and enhance team collaboration.
-
Updated
Nov 10, 2025 - Solidity
🌵 Build and manage efficient, scalable workflows with Prickly, designed to simplify your project tracking and enhance team collaboration.
Off-box publisher stack for T-Pot + Cisco ASA that turns SSH / ADBHoney / ASA / full-honeypot telemetry into chunky, deduped AlienVault OTX pulses (IPs, URLs, hashes). Runs on its own VM over an SSH tunnel, with systemd’d schedulers and an AI-assisted brain doing the enrichment, tagging, and monthly “big boi” pulse rollups for you.
Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/
Built and deployed a simulated enterprise network for threat hunting analysis and network monitoring utilising pfSense, Suricata, Cowrie, Wazuh, and Kali Linux.
DEFpot is a real-time “Wall of Sheep” for hackers. It uses Cowrie to capture SSH login attempts, commands, and scan activity, and displays them live through a Flask web app.
Potbuster is a tool for detecting SSH honeypots. It runs multiple checks to identify potential honeypot servers, including banner analysis, connection delay, invalid command responses, and more. This tool is useful for security testing of SSH servers to uncover possible traps or suspicious behavior.
Multi-honeypot deployment platform with centralized logging - Deploy Cowrie SSH, Elasticpot, and Redis honeypots on Kubernetes with Elastic Stack monitoring
A script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
🛡️A machine learning-based Intrusion Detection System that uses the Cowrie honeypot to collect attack data in a Debian VMware setup. Data is stored in MongoDB and analyzed using the AdaBoost algorithm ⚙️ to detect threats. This project shows how honeypots and ML can enhance cybersecurity.
Deception & Honeypot for Attack Profiling. Proof of Concept for the Network Security course of Free University of Brussels. MS Cybersecurity 24-25. Based on L. Spitzner's book; 'Honeypots: Tracking Hackers' (2002), applied to a SEA-based Virtual Private Server running Ubuntu. Grading: 90%
A deception-based SSH honeypot that simulates a forgotten dev box to study attacker behavior.
A cloud-native honeypot system built using Cowrie on Amazon EC2, designed to attract, log, and analyze malicious behavior. Leveraging AWS services including S3, CloudWatch, Lambda, and DynamoDB.
Potbuster is a tool for detecting SSH honeypots. It runs multiple checks to identify potential honeypot servers, including banner analysis, connection delay, invalid command responses, and more. This tool is useful for security testing of SSH servers to uncover possible traps or suspicious behavior.
A Cowrie SSH Honeypot Monitor and Logger
Multi-task NLP on Cowrie honeypot attacker-session logs—classification, QA, summarization & remediation; Flask/Django integration.
Add a description, image, and links to the cowrie topic page so that developers can more easily learn about it.
To associate your repository with the cowrie topic, visit your repo's landing page and select "manage topics."