一款适用于红蓝对抗中的仿真钓鱼系统
-
Updated
May 30, 2023 - Go
一款适用于红蓝对抗中的仿真钓鱼系统
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, smb, smtp, snmp, socks5, ssh, telnet, vnc)
19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres, MySQL, MSSQL, Elastic and ldap)
This repo collects almost all the smart contract honeypots that you could find in the first three pages of Google search.
THE ESP8266 HONEYPOT
Honeyscanner: A vulnerability analyzer for honeypots
Tutorial on how to create your own honeypot erc20/ bep20 tokens and listing to Uniswap
Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.
Interactive, dynamic, and realistic LLM honeypots
An awesome list of honeypot resources. With repository stars⭐ and forks🍴
an awesome list of active defense resources
Step By Step Guide on How to create a Honeypot Token.
Automation tool for Windows Deception Host Burn-In
The Attacker IP Prioritizer(AIP) dynamically generates resource-friendly IPv4 blocklists from Zeek network flows.
⚱️ 💊 🔐 #1st Time On Internet - Check If Token is honeypot or not 🥇
tutorial on how to create honeypot token
Honeypot servers with an integrated threat feed
Add a description, image, and links to the honeypots topic page so that developers can more easily learn about it.
To associate your repository with the honeypots topic, visit your repo's landing page and select "manage topics."