8f781db1ec
Added 'http://' to some URL's |
||
---|---|---|
CONTRIBUTING.md | ||
LICENSE | ||
README.md |
Awesome Honeypots
A curated list of awesome honeypots, tools, components and much more. The list is divided into categories such as web, services, and others, focusing on open source projects. There is no pre-established order of items in each category, the order is for contribution. If you want to contribute, please read the guide.
A related list for many of us is awesome-pcaptools, useful in network traffic analysis.
-
Database Honeypots
-
Web honeypots
-
Service Honeypots
- Kippo - Medium interaction SSH honeypot
- for NTP
- Camera pot *
-
Anti-honeypot stuff
- kippo_detect This is not a honeypot, but it detects kippo. (This guy has lots of more interesting stuff)
-
ICS/SCADA honeypots
-
Deployment
-
Visualization
-
Data Analysis
-
Other/random
- NOVA uses honeypots as detectors, looks like a complete system
- Mantrap / Symantec Decoy Server
- BigEye
- BackOfficer Friendly
-
Proxy honeypot
-
Open Relay Spam Honeypot
-
Botnet C2 monitor
-
IPv6 attack detection tool
-
PHP honeypot
-
Honeypot Database
-
Research Paper
-
Honeynet statistics
-
Visual analsysis for network traffic
-
dynamic code instrumentation toolkit
-
Front-end for dionaea
-
Tool to convert website to server honeypots
-
Malware collector
-
Sebek in QEMU
-
Malware Simulator
-
Distributed sensor deployment
-
Network Analysis Tool
-
Log anonymizer
-
server
-
Botnet traffic detection
-
Low interaction honeypot (router back door)
-
honeynet farm traffic redirector
-
IDS signature generator
-
Fake wireless access point
-
HTTPS Proxy
-
spamtrap
-
System instrumentation
-
Honeypot for USB-spreading malware
-
Data Collection
-
Honeyd viewer
-
Passive network audit framework parser
-
Honeyd to MySQL connector
-
VM Introspection
-
Binary debugger
-
Mobile Analysis Tool
-
Low interaction honeypot
-
Honeynet data fusion
-
Server
- [Tiny Honeypot](http://www.alpinista.org/thp/ -> http://web.archive.org/web/20090606073121/http://www.alpinista.org/files/thp/)
- Nephenthes
- LaBrea
- Kippo
- KFSensor
- Honeytrap
- Honeyd
- Bootable honeyd
- Honeeebox
- Glastopf
- DNS Honeypot
- Django-kippo
- Dionaea
- Conpot
- Bifrozt
- Beeswarm
- Bait and Switch
- Artillery
- Amun
-
VM cloaking script
-
Honeyd ported to Windows
-
IDS signature generation
-
Multiple
-
Web interface to packet analyzer
-
lookup service for AS-numbers and prefixes
-
Data Collection / Analysis Tool
-
Wordpress spam honeypot
-
Web interface (for Thug)
-
Snort binary carving
-
Data Collection / Data Sharing
-
PE-executables analyses
-
Distributed spam tracking
-
Python bindings for libemu
-
Client honeypot
-
Controlled-relay spam honeypot
-
Visualization Tool
- [Webviz](not working)
- Glastopf Analytics
- Afterglow Cloud
- Afterglow
-
central management tool
-
Network connection analyzer
-
Virtual Machine Cloaking
-
A script to visualize statistics from honeyd
-
Honeypot deployment
-
Honeyd UI
-
Honeynet analysis tool
-
Automated malware analysis system
-
Low interaction
-
Low interaction honeypot on USB stick
-
Honeypot extensions to Wireshark
-
Data Analysis Tool
-
Telephony honeypot
-
Client
-
Commercial high interaction honeypot
-
Visual analysis for network traffic
-
Binary Management and Analysis Framework
-
Honeypot
-
PDF document inspector
-
Distribution system
-
HoneyClient Management
-
Network Analysis
-
Hybrid low/high interaction honeypot
-
Sebek on Xen
-
SSH Honeypot
-
Glastopf data analysis
-
Distributed sensor project
-
a pcap analyzer
-
Client Web crawler
-
network traffic redirector
-
Honeypot Distribution with mixed content
-
Honeypot sensor
-
File carving
-
File and Network Threat Intelligence
-
data capture
-
SSH proxy
-
Anti-Cheat
-
behavioral analysis tool for win32
-
Live CD
-
Spamtrap
-
Commercial honeynet
-
Server (Bluetooth)
-
Honeyd stats
-
Dynamic analysis of Android apps
-
Dockerized Low Interaction packaging
-
Network analysis
-
Sebek data visualization
-
Threat Intel feed aggregator / network grapher
-
Sandbox
-
SIP Server
-
Honeyd plugin
-
Sandbox-as-a-Service
-
Botnet C2 monitoring
-
low interaction
-
Malware collection
-
sandbox