LAN-level socket cloak and manipulation toolkit
-
Updated
Dec 14, 2025 - Python
LAN-level socket cloak and manipulation toolkit
This project deploys an SSH Honeypot on Azure using Terraform, logging unauthorized access attempts and integrating with AbuseIPDB for threat analysis. It features an improved pshitt version and allows SSH disablement, with access via Azure Serial Console. Open-source for further enhancements!.
An awesome list of honeypot resources. With repository stars⭐ and forks🍴
T-Pot to AbuseIPDB (beta).
An SSH honeypot written entirely in Go.
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, smb, smtp, snmp, socks5, ssh, telnet, vnc)
Potbuster is a tool for detecting SSH honeypots. It runs multiple checks to identify potential honeypot servers, including banner analysis, connection delay, invalid command responses, and more. This tool is useful for security testing of SSH servers to uncover possible traps or suspicious behavior.
A system to gather suspicious URLs from SSH honeynets and to semi-automatically evaluate whether they are malicious or not.
Highly customizable low-interaction experimental honeypot that mimics specific hosts.
Exemplo de uso de formulário com PHP
Potbuster is a tool for detecting SSH honeypots. It runs multiple checks to identify potential honeypot servers, including banner analysis, connection delay, invalid command responses, and more. This tool is useful for security testing of SSH servers to uncover possible traps or suspicious behavior.
Jebakan is a modular honeypot system written in Python for cybersecurity research, threat intelligence gathering, and network security monitoring.
Passive Captcha Defense based on behavioural analytics and honeypot Traps with advanced ML Models for Bot Detection
building a fully uncordinated deception . The goal is to make attackers waste time, expose themselves, and get trapped while real assets stay untouched.
Add a description, image, and links to the honeypots topic page so that developers can more easily learn about it.
To associate your repository with the honeypots topic, visit your repo's landing page and select "manage topics."