From e6de10f99d6af123e8cc03081366f5f1dbdff999 Mon Sep 17 00:00:00 2001 From: Yevhenii Kutsenko Date: Sat, 28 Dec 2024 16:10:08 +0300 Subject: [PATCH] Initial commit --- .travis.yml | 9 + CONTRIBUTING.md | 14 ++ LICENSE | 202 ++++++++++++++++++ README.md | 546 +++++++++++++++++++++++++++++++++++++++++++++++ README_CN.md | 480 +++++++++++++++++++++++++++++++++++++++++ awesome-check.py | 19 ++ 6 files changed, 1270 insertions(+) create mode 100644 .travis.yml create mode 100644 CONTRIBUTING.md create mode 100644 LICENSE create mode 100644 README.md create mode 100644 README_CN.md create mode 100755 awesome-check.py diff --git a/.travis.yml b/.travis.yml new file mode 100644 index 0000000..4785076 --- /dev/null +++ b/.travis.yml @@ -0,0 +1,9 @@ +language: ruby +rvm: + - 2.2 +before_script: + - gem install awesome_bot +script: + - awesome_bot README.md --white-list https://github.com/sindresorhus/awesome,http://hpfriends.honeycloud.net/#/home,https://malwr.com/ + - awesome_bot README_CN.md --white-list https://github.com/sindresorhus/awesome,http://hpfriends.honeycloud.net/#/home,https://malwr.com/ + diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md new file mode 100644 index 0000000..24974c5 --- /dev/null +++ b/CONTRIBUTING.md @@ -0,0 +1,14 @@ +# Contribution Guidelines + +Please ensure your pull request adheres to the following guidelines: + +- Search previous suggestions before making a new one, as yours may be a duplicate. +- Make an individual pull request for each suggestion. +- Use the following format: `[PACKAGE](LINK) - DESCRIPTION.` +- New categories, or improvements to the existing categorization are welcome. +- Keep descriptions short and simple, but descriptive. +- End all descriptions with a full stop/period. +- Check your spelling and grammar. +- Make sure your text editor is set to remove trailing whitespace. + +Your contributions are always welcome! Thank you for your suggestions! diff --git a/LICENSE b/LICENSE new file mode 100644 index 0000000..3c7b252 --- /dev/null +++ b/LICENSE @@ -0,0 +1,202 @@ + The Artistic License 2.0 + + Copyright (c) 2015-2024 jose nazario + + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + +Preamble + +This license establishes the terms under which a given free software +Package may be copied, modified, distributed, and/or redistributed. +The intent is that the Copyright Holder maintains some artistic +control over the development of that Package while still keeping the +Package available as open source and free software. + +You are always permitted to make arrangements wholly outside of this +license directly with the Copyright Holder of a given Package. If the +terms of this license do not permit the full use that you propose to +make of the Package, you should contact the Copyright Holder and seek +a different licensing arrangement. + +Definitions + + "Copyright Holder" means the individual(s) or organization(s) + named in the copyright notice for the entire Package. + + "Contributor" means any party that has contributed code or other + material to the Package, in accordance with the Copyright Holder's + procedures. + + "You" and "your" means any person who would like to copy, + distribute, or modify the Package. + + "Package" means the collection of files distributed by the + Copyright Holder, and derivatives of that collection and/or of + those files. A given Package may consist of either the Standard + Version, or a Modified Version. + + "Distribute" means providing a copy of the Package or making it + accessible to anyone else, or in the case of a company or + organization, to others outside of your company or organization. + + "Distributor Fee" means any fee that you charge for Distributing + this Package or providing support for this Package to another + party. It does not mean licensing fees. + + "Standard Version" refers to the Package if it has not been + modified, or has been modified only in ways explicitly requested + by the Copyright Holder. + + "Modified Version" means the Package, if it has been changed, and + such changes were not explicitly requested by the Copyright + Holder. + + "Original License" means this Artistic License as Distributed with + the Standard Version of the Package, in its current version or as + it may be modified by The Perl Foundation in the future. + + "Source" form means the source code, documentation source, and + configuration files for the Package. + + "Compiled" form means the compiled bytecode, object code, binary, + or any other form resulting from mechanical transformation or + translation of the Source form. + + +Permission for Use and Modification Without Distribution + +(1) You are permitted to use the Standard Version and create and use +Modified Versions for any purpose without restriction, provided that +you do not Distribute the Modified Version. + + +Permissions for Redistribution of the Standard Version + +(2) You may Distribute verbatim copies of the Source form of the +Standard Version of this Package in any medium without restriction, +either gratis or for a Distributor Fee, provided that you duplicate +all of the original copyright notices and associated disclaimers. At +your discretion, such verbatim copies may or may not include a +Compiled form of the Package. + +(3) You may apply any bug fixes, portability changes, and other +modifications made available from the Copyright Holder. The resulting +Package will still be considered the Standard Version, and as such +will be subject to the Original License. + + +Distribution of Modified Versions of the Package as Source + +(4) You may Distribute your Modified Version as Source (either gratis +or for a Distributor Fee, and with or without a Compiled form of the +Modified Version) provided that you clearly document how it differs +from the Standard Version, including, but not limited to, documenting +any non-standard features, executables, or modules, and provided that +you do at least ONE of the following: + + (a) make the Modified Version available to the Copyright Holder + of the Standard Version, under the Original License, so that the + Copyright Holder may include your modifications in the Standard + Version. + + (b) ensure that installation of your Modified Version does not + prevent the user installing or running the Standard Version. In + addition, the Modified Version must bear a name that is different + from the name of the Standard Version. + + (c) allow anyone who receives a copy of the Modified Version to + make the Source form of the Modified Version available to others + under + + (i) the Original License or + + (ii) a license that permits the licensee to freely copy, + modify and redistribute the Modified Version using the same + licensing terms that apply to the copy that the licensee + received, and requires that the Source form of the Modified + Version, and of any works derived from it, be made freely + available in that license fees are prohibited but Distributor + Fees are allowed. + + +Distribution of Compiled Forms of the Standard Version +or Modified Versions without the Source + +(5) You may Distribute Compiled forms of the Standard Version without +the Source, provided that you include complete instructions on how to +get the Source of the Standard Version. Such instructions must be +valid at the time of your distribution. If these instructions, at any +time while you are carrying out such distribution, become invalid, you +must provide new instructions on demand or cease further distribution. +If you provide valid instructions or cease distribution within thirty +days after you become aware that the instructions are invalid, then +you do not forfeit any of your rights under this license. + +(6) You may Distribute a Modified Version in Compiled form without +the Source, provided that you comply with Section 4 with respect to +the Source of the Modified Version. + + +Aggregating or Linking the Package + +(7) You may aggregate the Package (either the Standard Version or +Modified Version) with other packages and Distribute the resulting +aggregation provided that you do not charge a licensing fee for the +Package. Distributor Fees are permitted, and licensing fees for other +components in the aggregation are permitted. The terms of this license +apply to the use and Distribution of the Standard or Modified Versions +as included in the aggregation. + +(8) You are permitted to link Modified and Standard Versions with +other works, to embed the Package in a larger work of your own, or to +build stand-alone binary or bytecode versions of applications that +include the Package, and Distribute the result without restriction, +provided the result does not expose a direct interface to the Package. + + +Items That are Not Considered Part of a Modified Version + +(9) Works (including, but not limited to, modules and scripts) that +merely extend or make use of the Package, do not, by themselves, cause +the Package to be a Modified Version. In addition, such works are not +considered parts of the Package itself, and are not subject to the +terms of this license. + + +General Provisions + +(10) Any use, modification, and distribution of the Standard or +Modified Versions is governed by this Artistic License. By using, +modifying or distributing the Package, you accept this license. Do not +use, modify, or distribute the Package, if you do not accept this +license. + +(11) If your Modified Version has been derived from a Modified +Version made by someone other than you, you are nevertheless required +to ensure that your Modified Version complies with the requirements of +this license. + +(12) This license does not grant you the right to use any trademark, +service mark, tradename, or logo of the Copyright Holder. + +(13) This license includes the non-exclusive, worldwide, +free-of-charge patent license to make, have made, use, offer to sell, +sell, import and otherwise transfer the Package with respect to any +patent claims licensable by the Copyright Holder that are necessarily +infringed by the Package. If you institute patent litigation +(including a cross-claim or counterclaim) against any party alleging +that the Package constitutes direct or contributory patent +infringement, then this Artistic License to you shall terminate on the +date that such litigation is filed. + +(14) Disclaimer of Warranty: +THE PACKAGE IS PROVIDED BY THE COPYRIGHT HOLDER AND CONTRIBUTORS "AS +IS' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES. THE IMPLIED +WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR +NON-INFRINGEMENT ARE DISCLAIMED TO THE EXTENT PERMITTED BY YOUR LOCAL +LAW. UNLESS REQUIRED BY LAW, NO COPYRIGHT HOLDER OR CONTRIBUTOR WILL +BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL +DAMAGES ARISING IN ANY WAY OUT OF THE USE OF THE PACKAGE, EVEN IF +ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + diff --git a/README.md b/README.md new file mode 100644 index 0000000..17b5562 --- /dev/null +++ b/README.md @@ -0,0 +1,546 @@ +# Awesome Honeypots [![Awesome Honeypots](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) + +A curated list of awesome honeypots, plus related components and much more, divided into categories such as Web, services, and others, with a focus on free and open source projects. + +There is no pre-established order of items in each category, the order is for contribution. If you want to contribute, please read the [guide](CONTRIBUTING.md). + +Discover more awesome lists at [sindresorhus/awesome](https://github.com/sindresorhus/awesome). + +# Contents + +- [Awesome Honeypots ![Awesome Honeypots](https://github.com/sindresorhus/awesome)](#awesome-honeypots-) +- [Contents](#contents) + - [Related Lists](#related-lists) + - [Honeypots](#honeypots) + - [Honeyd Tools](#honeyd-tools) + - [Network and Artifact Analysis](#network-and-artifact-analysis) + - [Data Tools](#data-tools) + - [Guides](#guides) + +## Related Lists + +- [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools) - Useful in network traffic analysis. +- [awesome-malware-analysis](https://github.com/rshipp/awesome-malware-analysis) - Some overlap here for artifact analysis. + +## Honeypots + +- Database Honeypots + + - [Delilah](https://github.com/SecurityTW/delilah) - Elasticsearch Honeypot written in Python (originally from Novetta). + - [ESPot](https://github.com/mycert/ESPot) - Elasticsearch honeypot written in NodeJS, to capture every attempts to exploit CVE-2014-3120. + - [ElasticPot](https://gitlab.com/bontchev/elasticpot) - An Elasticsearch Honeypot. + - [Elastic honey](https://github.com/jordan-wright/elastichoney) - Simple Elasticsearch Honeypot. + - [MongoDB-HoneyProxy](https://github.com/Plazmaz/MongoDB-HoneyProxy) - MongoDB honeypot proxy. + - [NoSQLpot](https://github.com/torque59/nosqlpot) - Honeypot framework built on a NoSQL-style database. + - [mysql-honeypotd](https://github.com/sjinks/mysql-honeypotd) - Low interaction MySQL honeypot written in C. + - [MysqlPot](https://github.com/schmalle/MysqlPot) - MySQL honeypot, still very early stage. + - [pghoney](https://github.com/betheroot/pghoney) - Low-interaction Postgres Honeypot. + - [sticky_elephant](https://github.com/betheroot/sticky_elephant) - Medium interaction postgresql honeypot. + - [RedisHoneyPot](https://github.com/cypwnpwnsocute/RedisHoneyPot) - High Interaction Honeypot Solution for Redis protocol. + +- Web honeypots + + - [Express honeypot](https://github.com/christophe77/express-honeypot) - RFI & LFI honeypot using nodeJS and express. + - [EoHoneypotBundle](https://github.com/eymengunay/EoHoneypotBundle) - Honeypot type for Symfony2 forms. + - [Glastopf](https://github.com/mushorg/glastopf) - Web Application Honeypot. + - [Google Hack Honeypot](http://ghh.sourceforge.net) - Designed to provide reconnaissance against attackers that use search engines as a hacking tool against your resources. + - [HellPot](https://github.com/yunginnanet/HellPot) - Honeypot that tries to crash the bots and clients that visit it's location. + - [Laravel Application Honeypot](https://github.com/msurguy/Honeypot) - Simple spam prevention package for Laravel applications. + - [Nodepot](https://github.com/schmalle/Nodepot) - NodeJS web application honeypot. + - [PasitheaHoneypot](https://github.com/Marist-Innovation-Lab/PasitheaHoneypot) - RestAPI honeypot. + - [Servletpot](https://github.com/schmalle/servletpot) - Web application Honeypot. + - [Shadow Daemon](https://shadowd.zecure.org/overview/introduction/) - Modular Web Application Firewall / High-Interaction Honeypot for PHP, Perl, and Python apps. + - [StrutsHoneypot](https://github.com/Cymmetria/StrutsHoneypot) - Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers. + - [WebTrap](https://github.com/IllusiveNetworks-Labs/WebTrap) - Designed to create deceptive webpages to deceive and redirect attackers away from real websites. + - [basic-auth-pot (bap)](https://github.com/bjeborn/basic-auth-pot) - HTTP Basic Authentication honeypot. + - [bwpot](https://github.com/graneed/bwpot) - Breakable Web applications honeyPot. + - [django-admin-honeypot](https://github.com/dmpayton/django-admin-honeypot) - Fake Django admin login screen to notify admins of attempted unauthorized access. + - [drupo](https://github.com/d1str0/drupot) - Drupal Honeypot. + - [galah](https://github.com/0x4D31/galah) - an LLM-powered web honeypot using the OpenAI API. + - [honeyhttpd](https://github.com/bocajspear1/honeyhttpd) - Python-based web server honeypot builder. + - [honeyup](https://github.com/LogoiLab/honeyup) - An uploader honeypot designed to look like poor website security. + - [modpot](https://github.com/referefref/modpot) - Modpot is a modular web application honeypot framework and management application written in Golang and making use of gin framework. + - [owa-honeypot](https://github.com/joda32/owa-honeypot) - A basic flask based Outlook Web Honey pot. + - [phpmyadmin_honeypot](https://github.com/gfoss/phpmyadmin_honeypot) - Simple and effective phpMyAdmin honeypot. + - [shockpot](https://github.com/threatstream/shockpot) - WebApp Honeypot for detecting Shell Shock exploit attempts. + - [smart-honeypot](https://github.com/freak3dot/smart-honeypot) - PHP Script demonstrating a smart honey pot. + - Snare/Tanner - successors to Glastopf + - [Snare](https://github.com/mushorg/snare) - Super Next generation Advanced Reactive honeypot. + - [Tanner](https://github.com/mushorg/tanner) - Evaluating SNARE events. + - [stack-honeypot](https://github.com/CHH/stack-honeypot) - Inserts a trap for spam bots into responses. + - [tomcat-manager-honeypot](https://github.com/helospark/tomcat-manager-honeypot) - Honeypot that mimics Tomcat manager endpoints. Logs requests and saves attacker's WAR file for later study. + - WordPress honeypots + - [HonnyPotter](https://github.com/MartinIngesen/HonnyPotter) - WordPress login honeypot for collection and analysis of failed login attempts. + - [HoneyPress](https://github.com/kungfuguapo/HoneyPress) - Python based WordPress honeypot in a Docker container. + - [wp-smart-honeypot](https://github.com/freak3dot/wp-smart-honeypot) - WordPress plugin to reduce comment spam with a smarter honeypot. + - [wordpot](https://github.com/gbrindisi/wordpot) - WordPress Honeypot. + - [Python-Honeypot](https://github.com/OWASP/Python-Honeypot) - OWASP Honeypot, Automated Deception Framework. + +- Service Honeypots + - [ADBHoney](https://github.com/huuck/ADBHoney) - Low interaction honeypot that simulates an Android device running Android Debug Bridge (ADB) server process. + - [AMTHoneypot](https://github.com/packetflare/amthoneypot) - Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689. + - [ddospot](https://github.com/aelth/ddospot) - NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot. + - [dionaea](https://github.com/DinoTools/dionaea) - Home of the dionaea honeypot. + - [dhp](https://github.com/ciscocsirt/dhp) - Simple Docker Honeypot server emulating small snippets of the Docker HTTP API. + - [DolosHoneypot](https://github.com/Marist-Innovation-Lab/DolosHoneypot) - SDN (software defined networking) honeypot. + - [Ensnare](https://github.com/ahoernecke/ensnare) - Easy to deploy Ruby honeypot. + - [Helix](https://github.com/Zeerg/helix-honeypot) - K8s API Honeypot with Active Defense Capabilities. + - [honeycomb_plugins](https://github.com/Cymmetria/honeycomb_plugins) - Plugin repository for Honeycomb, the honeypot framework by Cymmetria. + - [honeydb] (https://honeydb.io/downloads) - Multi-service honeypot that is easy to deploy and configure. Can be configured to send interaction data to to HoneyDB's centralized collectors for access via REST API. + - [honeyntp](https://github.com/fygrave/honeyntp) - NTP logger/honeypot. + - [honeypot-camera](https://github.com/alexbredo/honeypot-camera) - Observation camera honeypot. + - [honeypot-ftp](https://github.com/alexbredo/honeypot-ftp) - FTP Honeypot. + - [honeypots](https://github.com/qeeqbox/honeypots) - 25 different honeypots in a single pypi package! (dns, ftp, httpproxy, http, https, imap, mysql, pop3, postgres, redis, smb, smtp, socks5, ssh, telnet, vnc, mssql, elastic, ldap, ntp, memcache, snmp, oracle, sip and irc). + - [honeytrap](https://github.com/honeytrap/honeytrap) - Advanced Honeypot framework written in Go that can be connected with other honeypot software. + - [HoneyPy](https://github.com/foospidy/HoneyPy) - Low interaction honeypot. + - [Honeygrove](https://github.com/UHH-ISS/honeygrove) - Multi-purpose modular honeypot based on Twisted. + - [Honeyport](https://github.com/securitygeneration/Honeyport) - Simple honeyport written in Bash and Python. + - [Honeyprint](https://github.com/glaslos/honeyprint) - Printer honeypot. + - [Lyrebird](https://hub.docker.com/r/lyrebird/honeypot-base/) - Modern high-interaction honeypot framework. + - [MICROS honeypot](https://github.com/Cymmetria/micros_honeypot) - Low interaction honeypot to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS). + - [node-ftp-honeypot](https://github.com/christophe77/node-ftp-honeypot) - FTP server honeypot in JS. + - [pyrdp](https://github.com/gosecure/pyrdp) - RDP man-in-the-middle and library for Python 3 with the ability to watch connections live or after the fact. + - [rdppot](https://github.com/kryptoslogic/rdppot) - RDP honeypot + - [RDPy](https://github.com/citronneur/rdpy) - Microsoft Remote Desktop Protocol (RDP) honeypot implemented in Python. + - [SMB Honeypot](https://github.com/r0hi7/HoneySMB) - High interaction SMB service honeypot capable of capturing wannacry-like Malware. + - [Tom's Honeypot](https://github.com/inguardians/toms_honeypot) - Low interaction Python honeypot. + - [Trapster Commmunity](https://github.com/0xBallpoint/trapster-community) - Modural and easy to install Python Honeypot, with comprehensive alerting + - [troje](https://github.com/dutchcoders/troje/) - Honeypot that runs each connection with the service within a separate LXC container. + - [WebLogic honeypot](https://github.com/Cymmetria/weblogic_honeypot) - Low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. + - [WhiteFace Honeypot](https://github.com/csirtgadgets/csirtg-honeypot) - Twisted based honeypot for WhiteFace. + +- Distributed Honeypots + + - [DemonHunter](https://github.com/RevengeComing/DemonHunter) - Low interaction honeypot server. + +- Anti-honeypot stuff + + - [canarytokendetector](https://github.com/referefref/canarytokendetector) - Tool for detection and nullification of Thinkst CanaryTokens + - [honeydet](https://github.com/referefref/honeydet) - Signature based honeypot detector tool written in Golang + - [kippo_detect](https://github.com/andrew-morris/kippo_detect) - Offensive component that detects the presence of the kippo honeypot. + +- ICS/SCADA honeypots + + - [Conpot](https://github.com/mushorg/conpot) - ICS/SCADA honeypot. + - [GasPot](https://github.com/sjhilt/GasPot) - Veeder Root Gaurdian AST, common in the oil and gas industry. + - [SCADA honeynet](http://scadahoneynet.sourceforge.net) - Building Honeypots for Industrial Networks. + - [gridpot](https://github.com/sk4ld/gridpot) - Open source tools for realistic-behaving electric grid honeynets. + - [scada-honeynet](http://www.digitalbond.com/blog/2007/07/24/scada-honeynet-article-in-infragard-publication/) - Mimics many of the services from a popular PLC and better helps SCADA researchers understand potential risks of exposed control system devices. + +- Other/random + + - [CitrixHoneypot](https://github.com/MalwareTech/CitrixHoneypot) - Detect and log CVE-2019-19781 scan and exploitation attempts. + - [Damn Simple Honeypot (DSHP)](https://github.com/naorlivne/dshp) - Honeypot framework with pluggable handlers. + - [dicompot](https://github.com/nsmfoo/dicompot) - DICOM Honeypot. + - [IPP Honey](https://gitlab.com/bontchev/ipphoney) - A honeypot for the Internet Printing Protocol. + - [Log4Pot](https://github.com/thomaspatzke/Log4Pot) - A honeypot for the Log4Shell vulnerability (CVE-2021-44228). + - [Masscanned](https://github.com/ivre/masscanned) - Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hosted alternative to GreyNoise. + - [medpot](https://github.com/schmalle/medpot) - HL7 / FHIR honeypot. + - [NOVA](https://github.com/DataSoft/Nova) - Uses honeypots as detectors, looks like a complete system. + - [OpenFlow Honeypot (OFPot)](https://github.com/upa/ofpot) - Redirects traffic for unused IPs to a honeypot, built on POX. + - [OpenCanary](https://github.com/thinkst/opencanary) - Modular and decentralised honeypot daemon that runs several canary versions of services that alerts when a service is (ab)used. + - [ciscoasa_honeypot](https://github.com/cymmetria/ciscoasa_honeypot) A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability. + - [miniprint](https://github.com/sa7mon/miniprint) - A medium interaction printer honeypot. + +- Botnet C2 tools + + - [Hale](https://github.com/pjlantz/Hale) - Botnet command and control monitor. + - [dnsMole](https://code.google.com/archive/p/dns-mole/) - Analyses DNS traffic and potentionaly detect botnet command and control server activity, along with infected hosts. + +- IPv6 attack detection tool + + - [ipv6-attack-detector](https://github.com/mzweilin/ipv6-attack-detector/) - Google Summer of Code 2012 project, supported by The Honeynet Project organization. + +- Dynamic code instrumentation toolkit + + - [Frida](https://www.frida.re) - Inject JavaScript to explore native apps on Windows, Mac, Linux, iOS and Android. + +- Tool to convert website to server honeypots + + - [HIHAT](http://hihat.sourceforge.net/) - Transform arbitrary PHP applications into web-based high-interaction Honeypots. + +- Malware collector + + - [Kippo-Malware](https://bruteforcelab.com/kippo-malware) - Python script that will download all malicious files stored as URLs in a Kippo SSH honeypot database. + +- Distributed sensor deployment + + - [Community Honey Network](https://communityhoneynetwork.readthedocs.io/en/stable/) - CHN aims to make deployments honeypots and honeypot management tools easy and flexible. The default deployment method uses Docker Compose and Docker to deploy with a few simple commands. + - [Modern Honey Network](https://github.com/threatstream/mhn) - Multi-snort and honeypot sensor management, uses a network of VMs, small footprint SNORT installations, stealthy dionaeas, and a centralized server for management. + +- Network Analysis Tool + + - [Tracexploit](https://code.google.com/archive/p/tracexploit/) - Replay network packets. + +- Log anonymizer + + - [LogAnon](http://code.google.com/archive/p/loganon/) - Log anonymization library that helps having anonymous logs consistent between logs and network captures. + +- Low interaction honeypot (router back door) + + - [Honeypot-32764](https://github.com/knalli/honeypot-for-tcp-32764) - Honeypot for router backdoor (TCP 32764). + - [WAPot](https://github.com/lcashdol/WAPot) - Honeypot that can be used to observe traffic directed at home routers. + +- honeynet farm traffic redirector + + - [Honeymole](https://web.archive.org/web/20100326040550/http://www.honeynet.org.pt:80/index.php/HoneyMole) - Deploy multiple sensors that redirect traffic to a centralized collection of honeypots. + +- HTTPS Proxy + + - [mitmproxy](https://mitmproxy.org/) - Allows traffic flows to be intercepted, inspected, modified, and replayed. + +- System instrumentation + + - [Sysdig](https://sysdig.com/opensource/) - Open source, system-level exploration allows one to capture system state and activity from a running GNU/Linux instance, then save, filter, and analyze the results. + - [Fibratus](https://github.com/rabbitstack/fibratus) - Tool for exploration and tracing of the Windows kernel. + +- Honeypot for USB-spreading malware + + - [Ghost-usb](https://github.com/honeynet/ghost-usb-honeypot) - Honeypot for malware that propagates via USB storage devices. + +- Data Collection + + - [Kippo2MySQL](https://bruteforcelab.com/kippo2mysql) - Extracts some very basic stats from Kippo’s text-based log files and inserts them in a MySQL database. + - [Kippo2ElasticSearch](https://bruteforcelab.com/kippo2elasticsearch) - Python script to transfer data from a Kippo SSH honeypot MySQL database to an ElasticSearch instance (server or cluster). + +- Passive network audit framework parser + + - [Passive Network Audit Framework (pnaf)](https://github.com/jusafing/pnaf) - Framework that combines multiple passive and automated analysis techniques in order to provide a security assessment of network platforms. + +- VM monitoring and tools + + - [Antivmdetect](https://github.com/nsmfoo/antivmdetection) - Script to create templates to use with VirtualBox to make VM detection harder. + - [VMCloak](https://github.com/hatching/vmcloak) - Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox. + - [vmitools](http://libvmi.com/) - C library with Python bindings that makes it easy to monitor the low-level details of a running virtual machine. + +- Binary debugger + + - [Hexgolems - Pint Debugger Backend](https://github.com/hexgolems/pint) - Debugger backend and LUA wrapper for PIN. + - [Hexgolems - Schem Debugger Frontend](https://github.com/hexgolems/schem) - Debugger frontend. + +- Mobile Analysis Tool + + - [Androguard](https://github.com/androguard/androguard) - Reverse engineering, Malware and goodware analysis of Android applications and more. + - [APKinspector](https://github.com/honeynet/apkinspector/) - Powerful GUI tool for analysts to analyze the Android applications. + +- Low interaction honeypot + + - [Honeyperl](https://sourceforge.net/projects/honeyperl/) - Honeypot software based in Perl with plugins developed for many functions like : wingates, telnet, squid, smtp, etc. + - [T-Pot](https://github.com/dtag-dev-sec/tpotce) - All in one honeypot appliance from telecom provider T-Mobile + - [beelzebub](https://github.com/mariocandela/beelzebub) - A secure honeypot framework, extremely easy to configure by yaml 🚀 + +- Honeynet data fusion + + - [HFlow2](https://projects.honeynet.org/hflow) - Data coalesing tool for honeynet/network analysis. + +- Server + + - [Amun](http://amunhoney.sourceforge.net) - Vulnerability emulation honeypot. + - [Artillery](https://github.com/trustedsec/artillery/) - Open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods. + - [Bait and Switch](http://baitnswitch.sourceforge.net) - Redirects all hostile traffic to a honeypot that is partially mirroring your production system. + - [Bifrozt](https://github.com/Ziemeck/bifrozt-ansible) - Automatic deploy bifrozt with ansible. + - [Conpot](http://conpot.org/) - Low interactive server side Industrial Control Systems honeypot. + - [Heralding](https://github.com/johnnykv/heralding) - Credentials catching honeypot. + - [HoneyWRT](https://github.com/CanadianJeff/honeywrt) - Low interaction Python honeypot designed to mimic services or ports that might get targeted by attackers. + - [Honeyd](https://github.com/provos/honeyd) - See [honeyd tools](#honeyd-tools). + - [Honeysink](http://www.honeynet.org/node/773) - Open source network sinkhole that provides a mechanism for detection and prevention of malicious traffic on a given network. + - [Hontel](https://github.com/stamparm/hontel) - Telnet Honeypot. + - [KFSensor](http://www.keyfocus.net/kfsensor/) - Windows based honeypot Intrusion Detection System (IDS). + - [LaBrea](http://labrea.sourceforge.net/labrea-info.html) - Takes over unused IP addresses, and creates virtual servers that are attractive to worms, hackers, and other denizens of the Internet. + - [MTPot](https://github.com/Cymmetria/MTPot) - Open Source Telnet Honeypot, focused on Mirai malware. + - [SIREN](https://github.com/blaverick62/SIREN) - Semi-Intelligent HoneyPot Network - HoneyNet Intelligent Virtual Environment. + - [TelnetHoney](https://github.com/balte/TelnetHoney) - Simple telnet honeypot. + - [UDPot Honeypot](https://github.com/jekil/UDPot) - Simple UDP/DNS honeypot scripts. + - [Yet Another Fake Honeypot (YAFH)](https://github.com/fnzv/YAFH) - Simple honeypot written in Go. + - [arctic-swallow](https://github.com/ajackal/arctic-swallow) - Low interaction honeypot. + - [fapro](https://github.com/fofapro/fapro) - Fake Protocol Server. + - [glutton](https://github.com/mushorg/glutton) - All eating honeypot. + - [go-HoneyPot](https://github.com/Mojachieee/go-HoneyPot) - Honeypot server written in Go. + - [go-emulators](https://github.com/kingtuna/go-emulators) - Honeypot Golang emulators. + - [honeymail](https://github.com/sec51/honeymail) - SMTP honeypot written in Golang. + - [honeytrap](https://github.com/tillmannw/honeytrap) - Low-interaction honeypot and network security tool written to catch attacks against TCP and UDP services. + - [imap-honey](https://github.com/yvesago/imap-honey) - IMAP honeypot written in Golang. + - [mwcollectd](https://www.openhub.net/p/mwcollectd) - Versatile malware collection daemon, uniting the best features of nepenthes and honeytrap. + - [potd](https://github.com/lnslbrty/potd) - Highly scalable low- to medium-interaction SSH/TCP honeypot designed for OpenWrt/IoT devices leveraging several Linux kernel features, such as namespaces, seccomp and thread capabilities. + - [portlurker](https://github.com/bartnv/portlurker) - Port listener in Rust with protocol guessing and safe string display. + - [slipm-honeypot](https://github.com/rshipp/slipm-honeypot) - Simple low-interaction port monitoring honeypot. + - [telnet-iot-honeypot](https://github.com/Phype/telnet-iot-honeypot) - Python telnet honeypot for catching botnet binaries. + - [telnetlogger](https://github.com/robertdavidgraham/telnetlogger) - Telnet honeypot designed to track the Mirai botnet. + - [vnclowpot](https://github.com/magisterquis/vnclowpot) - Low interaction VNC honeypot. + +- IDS signature generation + + - [Honeycomb](http://www.icir.org/christian/honeycomb/) - Automated signature creation using honeypots. + +- Lookup service for AS-numbers and prefixes + + - [CC2ASN](http://www.cc2asn.com/) - Simple lookup service for AS-numbers and prefixes belonging to any given country in the world. + +- Data Collection / Data Sharing + + - [HPfriends](http://hpfriends.honeycloud.net/#/home) - Honeypot data-sharing platform. + - [hpfriends - real-time social data-sharing](https://heipei.io/sigint-hpfriends/) - Presentation about HPFriends feed system + - [HPFeeds](https://github.com/rep/hpfeeds/) - Lightweight authenticated publish-subscribe protocol. + +- Central management tool + + - [PHARM](http://www.nepenthespharm.com/) - Manage, report, and analyze your distributed Nepenthes instances. + +- Network connection analyzer + + - [Impost](http://impost.sourceforge.net/) - Network security auditing tool designed to analyze the forensics behind compromised and/or vulnerable daemons. + +- Honeypot deployment + + - [honeyfs](https://github.com/referefref/honeyfs) - Tool to create artificial file systems for medium/high interaction honeypots. + - [Modern Honeynet Network](http://threatstream.github.io/mhn/) - Streamlines deployment and management of secure honeypots. + +- Honeypot extensions to Wireshark + + - [Wireshark Extensions](https://www.honeynet.org/project/WiresharkExtensions) - Apply Snort IDS rules and signatures against packet capture files using Wireshark. + +- Client + + - [CWSandbox / GFI Sandbox](https://www.gfi.com/products-and-solutions/all-products) + - [Capture-HPC-Linux](https://redmine.honeynet.org/projects/linux-capture-hpc/wiki) + - [Capture-HPC-NG](https://github.com/CERT-Polska/HSN-Capture-HPC-NG) + - [Capture-HPC](https://projects.honeynet.org/capture-hpc) - High interaction client honeypot (also called honeyclient). + - [HoneyBOT](http://www.atomicsoftwaresolutions.com/) + - [HoneyC](https://projects.honeynet.org/honeyc) + - [HoneySpider Network](https://github.com/CERT-Polska/hsn2-bundle) - Highly-scalable system integrating multiple client honeypots to detect malicious websites. + - [HoneyWeb](https://code.google.com/archive/p/gsoc-honeyweb/) - Web interface created to manage and remotely share Honeyclients resources. + - [Jsunpack-n](https://github.com/urule99/jsunpack-n) + - [MonkeySpider](http://monkeyspider.sourceforge.net) + - [PhoneyC](https://github.com/honeynet/phoneyc) - Python honeyclient (later replaced by Thug). + - [Pwnypot](https://github.com/shjalayeri/pwnypot) - High Interaction Client Honeypot. + - [Rumal](https://github.com/thugs-rumal/) - Thug's Rumāl: a Thug's dress and weapon. + - [Shelia](https://www.cs.vu.nl/~herbertb/misc/shelia/) - Client-side honeypot for attack detection. + - [Thug](https://buffer.github.io/thug/) - Python-based low-interaction honeyclient. + - [Thug Distributed Task Queuing](https://thug-distributed.readthedocs.io/en/latest/index.html) + - [Trigona](https://www.honeynet.org/project/Trigona) + - [URLQuery](https://urlquery.net/) + - [YALIH (Yet Another Low Interaction Honeyclient)](https://github.com/Masood-M/yalih) - Low-interaction client honeypot designed to detect malicious websites through signature, anomaly, and pattern matching techniques. + +- Honeypot + + - [Deception Toolkit](http://www.all.net/dtk/dtk.html) + - [IMHoneypot](https://github.com/mushorg/imhoneypot) + +- PDF document inspector + + - [peepdf](https://github.com/jesparza/peepdf) - Powerful Python tool to analyze PDF documents. + +- Hybrid low/high interaction honeypot + + - [HoneyBrid](http://honeybrid.sourceforge.net) + +- SSH Honeypots + + - [Blacknet](https://github.com/morian/blacknet) - Multi-head SSH honeypot system. + - [Cowrie](https://github.com/cowrie/cowrie) - Cowrie SSH Honeypot (based on kippo). + - [DShield docker](https://github.com/xme/dshield-docker) - Docker container running cowrie with DShield output enabled. + - [endlessh](https://github.com/skeeto/endlessh) - SSH tarpit that slowly sends an endless banner. ([docker image](https://hub.docker.com/r/linuxserver/endlessh)) + - [HonSSH](https://github.com/tnich/honssh) - Logs all SSH communications between a client and server. + - [HUDINX](https://github.com/Cryptix720/HUDINX) - Tiny interaction SSH honeypot engineered in Python to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker. + - [Kippo](https://github.com/desaster/kippo) - Medium interaction SSH honeypot. + - [Kippo_JunOS](https://github.com/gregcmartin/Kippo_JunOS) - Kippo configured to be a backdoored netscreen. + - [Kojoney2](https://github.com/madirish/kojoney2) - Low interaction SSH honeypot written in Python and based on Kojoney by Jose Antonio Coret. + - [Kojoney](http://kojoney.sourceforge.net/) - Python-based Low interaction honeypot that emulates an SSH server implemented with Twisted Conch. + - [Longitudinal Analysis of SSH Cowrie Honeypot Logs](https://github.com/deroux/longitudinal-analysis-cowrie) - Python based command line tool to analyze cowrie logs over time. + - [LongTail Log Analysis @ Marist College](http://longtail.it.marist.edu/honey/) - Analyzed SSH honeypot logs. + - [Malbait](https://github.com/batchmcnulty/Malbait) - Simple TCP/UDP honeypot implemented in Perl. + - [MockSSH](https://github.com/ncouture/MockSSH) - Mock an SSH server and define all commands it supports (Python, Twisted). + - [cowrie2neo](https://github.com/xlfe/cowrie2neo) - Parse cowrie honeypot logs into a neo4j database. + - [go-sshoney](https://github.com/ashmckenzie/go-sshoney) - SSH Honeypot. + - [go0r](https://github.com/fzerorubigd/go0r) - Simple ssh honeypot in Golang. + - [gohoney](https://github.com/PaulMaddox/gohoney) - SSH honeypot written in Go. + - [hived](https://github.com/sahilm/hived) - Golang-based honeypot. + - [hnypots-agent)](https://github.com/joshrendek/hnypots-agent) - SSH Server in Go that logs username and password combinations. + - [honeypot.go](https://github.com/mdp/honeypot.go) - SSH Honeypot written in Go. + - [honeyssh](https://github.com/ppacher/honeyssh) - Credential dumping SSH honeypot with statistics. + - [hornet](https://github.com/czardoz/hornet) - Medium interaction SSH honeypot that supports multiple virtual hosts. + - [ssh-auth-logger](https://github.com/JustinAzoff/ssh-auth-logger) - Low/zero interaction SSH authentication logging honeypot. + - [ssh-honeypot](https://github.com/droberson/ssh-honeypot) - Fake sshd that logs IP addresses, usernames, and passwords. + - [ssh-honeypot](https://github.com/amv42/sshd-honeypot) - Modified version of the OpenSSH deamon that forwards commands to Cowrie where all commands are interpreted and returned. + - [ssh-honeypotd](https://github.com/sjinks/ssh-honeypotd) - Low-interaction SSH honeypot written in C. + - [sshForShits](https://github.com/traetox/sshForShits) - Framework for a high interaction SSH honeypot. + - [sshesame](https://github.com/jaksi/sshesame) - Fake SSH server that lets everyone in and logs their activity. + - [sshhipot](https://github.com/magisterquis/sshhipot) - High-interaction MitM SSH honeypot. + - [sshlowpot](https://github.com/magisterquis/sshlowpot) - Yet another no-frills low-interaction SSH honeypot in Go. + - [sshsyrup](https://github.com/mkishere/sshsyrup) - Simple SSH Honeypot with features to capture terminal activity and upload to asciinema.org. + - [twisted-honeypots](https://github.com/lanjelot/twisted-honeypots) - SSH, FTP and Telnet honeypots based on Twisted. + +- Distributed sensor project + + - [DShield Web Honeypot Project](https://sites.google.com/site/webhoneypotsite/) + +- A pcap analyzer + + - [Honeysnap](https://projects.honeynet.org/honeysnap/) + +- Network traffic redirector + + - [Honeywall](https://projects.honeynet.org/honeywall/) + +- Honeypot Distribution with mixed content + + - [HoneyDrive](https://bruteforcelab.com/honeydrive) + +- Honeypot sensor + + - [Honeeepi](https://redmine.honeynet.org/projects/honeeepi/wiki) - Honeypot sensor on a Raspberry Pi based on a customized Raspbian OS. + +- File carving + + - [TestDisk & PhotoRec](https://www.cgsecurity.org/) + +- Behavioral analysis tool for win32 + + - [Capture BAT](https://www.honeynet.org/node/315) + +- Live CD + + - [DAVIX](https://www.secviz.org/node/89) - The DAVIX Live CD. + +- Spamtrap + + - [Mail::SMTP::Honeypot](https://metacpan.org/pod/release/MIKER/Mail-SMTP-Honeypot-0.11/Honeypot.pm) - Perl module that appears to provide the functionality of a standard SMTP server. + - [Mailoney](https://github.com/awhitehatter/mailoney) - SMTP honeypot, Open Relay, Cred Harvester written in python. + - [SendMeSpamIDS.py](https://github.com/johestephan/VerySimpleHoneypot) - Simple SMTP fetch all IDS and analyzer. + - [Shiva](https://github.com/shiva-spampot/shiva) - Spam Honeypot with Intelligent Virtual Analyzer. + - [Shiva The Spam Honeypot Tips And Tricks For Getting It Up And Running](https://www.pentestpartners.com/security-blog/shiva-the-spam-honeypot-tips-and-tricks-for-getting-it-up-and-running/) + - [SMTPLLMPot](https://github.com/referefref/SMTPLLMPot) - A super simple SMTP Honeypot built using GPT3.5 + - [SpamHAT](https://github.com/miguelraulb/spamhat) - Spam Honeypot Tool. + - [Spamhole](http://www.spamhole.net/) + - [honeypot](https://github.com/jadb/honeypot) - The Project Honey Pot un-official PHP SDK. + - [spamd](http://man.openbsd.org/cgi-bin/man.cgi?query=spamd%26apropos=0%26sektion=0%26manpath=OpenBSD+Current%26arch=i386%26format=html) + +- Commercial honeynet + + - [Cymmetria Mazerunner](ttps://cymmetria.com/products/mazerunner/) - Leads attackers away from real targets and creates a footprint of the attack. + +- Server (Bluetooth) + + - [Bluepot](https://github.com/andrewmichaelsmith/bluepot) + +- Dynamic analysis of Android apps + + - [Droidbox](https://code.google.com/archive/p/droidbox/) + +- Dockerized Low Interaction packaging + + - [Docker honeynet](https://github.com/sreinhardt/Docker-Honeynet) - Several Honeynet tools set up for Docker containers. + - [Dockerized Thug](https://hub.docker.com/r/honeynet/thug/) - Dockerized [Thug](https://github.com/buffer/thug) to analyze malicious web content. + - [Dockerpot](https://github.com/mrschyte/dockerpot) - Docker based honeypot. + - [Manuka](https://github.com/andrewmichaelsmith/manuka) - Docker based honeypot (Dionaea and Kippo). + - [honey_ports](https://github.com/run41/honey_ports) - Very simple but effective docker deployed honeypot to detect port scanning in your environment. + - [mhn-core-docker](https://github.com/MattCarothers/mhn-core-docker) - Core elements of the Modern Honey Network implemented in Docker. + +- Network analysis + + - [Quechua](https://bitbucket.org/zaccone/quechua) + +- SIP Server + + - [Artemnesia VoIP](http://artemisa.sourceforge.net) + +- SIP + + - [SentryPeer](https://github.com/SentryPeer/SentryPeer) - Protect your SIP Servers from bad actors. + +- IOT Honeypot + + - [HoneyThing](https://github.com/omererdem/honeything) - TR-069 Honeypot. + - [Kako](https://github.com/darkarnium/kako) - Honeypots for a number of well known and deployed embedded device vulnerabilities. + +- Honeytokens + - [CanaryTokens](https://github.com/thinkst/canarytokens) - Self-hostable honeytoken generator and reporting dashboard; demo version available at [CanaryTokens.org](https://canarytokens.org/generate). + - [Honeybits](https://github.com/0x4D31/honeybits) - Simple tool designed to enhance the effectiveness of your traps by spreading breadcrumbs and honeytokens across your production servers and workstations to lure the attacker toward your honeypots. + - [Honeyλ (HoneyLambda)](https://github.com/0x4D31/honeylambda) - Simple, serverless application designed to create and monitor URL honeytokens, on top of AWS Lambda and Amazon API Gateway. + - [dcept](https://github.com/secureworks/dcept) - Tool for deploying and detecting use of Active Directory honeytokens. + - [honeyku](https://github.com/0x4D31/honeyku) - Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens). + +## Honeyd Tools + +- Honeyd plugin + + - [Honeycomb](http://www.honeyd.org/tools.php) + +- Honeyd viewer + + - [Honeyview](http://honeyview.sourceforge.net/) + +- Honeyd to MySQL connector + + - [Honeyd2MySQL](https://bruteforcelab.com/honeyd2mysql) + +- A script to visualize statistics from honeyd + + - [Honeyd-Viz](https://bruteforcelab.com/honeyd-viz) + +- Honeyd stats + - [Honeydsum.pl](https://github.com/DataSoft/Honeyd/blob/master/scripts/misc/honeydsum-v0.3/honeydsum.pl) + +## Network and Artifact Analysis + +- Sandbox + + - [Argos](http://www.few.vu.nl/argos/) - Emulator for capturing zero-day attacks. + - [COMODO automated sandbox](https://help.comodo.com/topic-72-1-451-4768-.html) + - [Cuckoo](https://cuckoosandbox.org/) - Leading open source automated malware analysis system. + - [Pylibemu](https://github.com/buffer/pylibemu) - Libemu Cython wrapper. + - [RFISandbox](https://monkey.org/~jose/software/rfi-sandbox/) - PHP 5.x script sandbox built on top of [funcall](https://pecl.php.net/package/funcall). + - [dorothy2](https://github.com/m4rco-/dorothy2) - Malware/botnet analysis framework written in Ruby. + - [imalse](https://github.com/hbhzwj/imalse) - Integrated MALware Simulator and Emulator. + - [libemu](https://github.com/buffer/libemu) - Shellcode emulation library, useful for shellcode detection. + +- Sandbox-as-a-Service + + - [Hybrid Analysis](https://www.hybrid-analysis.com) - Free malware analysis service powered by Payload Security that detects and analyzes unknown threats using a unique Hybrid Analysis technology. + - [Joebox Cloud](https://jbxcloud.joesecurity.org/login) - Analyzes the behavior of malicious files including PEs, PDFs, DOCs, PPTs, XLSs, APKs, URLs and MachOs on Windows, Android and Mac OS X for suspicious activities. + - [VirusTotal](https://www.virustotal.com/) - Analyze suspicious files and URLs to detect types of malware, and automatically share them with the security community. + - [malwr.com](https://malwr.com/) - Free malware analysis service and community. + +## Data Tools + +- Front Ends + + - [DionaeaFR](https://github.com/rubenespadas/DionaeaFR) - Front Web to Dionaea low-interaction honeypot. + - [Django-kippo](https://github.com/jedie/django-kippo) - Django App for kippo SSH Honeypot. + - [Shockpot-Frontend](https://github.com/GovCERT-CZ/Shockpot-Frontend) - Full featured script to visualize statistics from a Shockpot honeypot. + - [Tango](https://github.com/aplura/Tango) - Honeypot Intelligence with Splunk. + - [Wordpot-Frontend](https://github.com/GovCERT-CZ/Wordpot-Frontend) - Full featured script to visualize statistics from a Wordpot honeypot. + - [honeyalarmg2](https://github.com/schmalle/honeyalarmg2) - Simplified UI for showing honeypot alarms. + - [honeypotDisplay](https://github.com/Joss-Steward/honeypotDisplay) - Flask website which displays data gathered from an SSH Honeypot. + +- Visualization + + - [Acapulco](https://github.com/hgascon/acapulco) - Automated Attack Community Graph Construction. + - [Afterglow Cloud](https://github.com/ayrus/afterglow-cloud) + - [Afterglow](http://afterglow.sourceforge.net/) + - [Glastopf Analytics](https://github.com/katkad/Glastopf-Analytics) - Easy honeypot statistics. + - [HoneyMalt](https://github.com/SneakersInc/HoneyMalt) - Maltego tranforms for mapping Honeypot systems. + - [HoneyMap](https://github.com/fw42/honeymap) - Real-time websocket stream of GPS events on a fancy SVG world map. + - [HoneyStats](https://sourceforge.net/projects/honeystats/) - Statistical view of the recorded activity on a Honeynet. + - [HpfeedsHoneyGraph](https://github.com/yuchincheng/HpfeedsHoneyGraph) - Visualization app to visualize hpfeeds logs. + - [IVRE](https://github.com/ivre/ivre) - Network recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Criminalip / Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more! + - [Kippo stats](https://github.com/mfontani/kippo-stats) - Mojolicious app to display statistics for your kippo SSH honeypot. + - [Kippo-Graph](https://bruteforcelab.com/kippo-graph) - Full featured script to visualize statistics from a Kippo SSH honeypot. + - [The Intelligent HoneyNet](https://github.com/jpyorre/IntelligentHoneyNet) - Create actionable information from honeypots. + - [ovizart](https://github.com/oguzy/ovizart) - Visual analysis for network traffic. + +## Guides + +- [T-Pot: A Multi-Honeypot Platform](https://dtag-dev-sec.github.io/mediator/feature/2015/03/17/concept.html) +- [Honeypot (Dionaea and kippo) setup script](https://github.com/andrewmichaelsmith/honeypot-setup-script/) + +- Deployment + + - [Dionaea and EC2 in 20 Minutes](http://andrewmichaelsmith.com/2012/03/dionaea-honeypot-on-ec2-in-20-minutes/) - Tutorial on setting up Dionaea on an EC2 instance. + - [Using a Raspberry Pi honeypot to contribute data to DShield/ISC](https://isc.sans.edu/diary/22680) - The Raspberry Pi based system will allow us to maintain one code base that will make it easier to collect rich logs beyond firewall logs. + - [honeypotpi](https://github.com/free5ty1e/honeypotpi) - Script for turning a Raspberry Pi into a HoneyPot Pi. + +- Research Papers + + - [Honeypot research papers](https://github.com/shbhmsingh72/Honeypot-Research-Papers) - PDFs of research papers on honeypots. + - [vEYE](https://link.springer.com/article/10.1007%2Fs10115-008-0137-3) - Behavioral footprinting for self-propagating worm detection and profiling. diff --git a/README_CN.md b/README_CN.md new file mode 100644 index 0000000..8bc9988 --- /dev/null +++ b/README_CN.md @@ -0,0 +1,480 @@ +# 最优秀的蜜罐列表 [![Awesome Honeypots](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) + +优秀的蜜罐、组件等等相关的工具列表,分为 Web、服务等多个类别,重点放在开源项目上 + +每个类别中没有顺序,按照提交的先后顺序排列,如果您也想提交,请阅读 [指南](CONTRIBUTING.md). + +探索更多优秀的列表请参阅:[sindresorhus/awesome](https://github.com/sindresorhus/awesome). + +# 目录 + +- [最优秀的蜜罐列表 ](#最优秀的蜜罐列表-) +- [目录](#目录) + - [相关列表](#相关列表) + - [蜜罐](#蜜罐) + - [Honeyd工具](#honeyd工具) + - [网络与行为分析](#网络与行为分析) + - [数据分析工具](#数据分析工具) + - [指南](#指南) + +## 相关列表 + +- [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools) 网络流量分析 +- [awesome-malware-analysis](https://github.com/rshipp/awesome-malware-analysis) 与上表有些重复,更侧重恶意软件分析 + +## 蜜罐 + +- 数据库蜜罐 + - [Delilah](https://github.com/SecurityTW/delilah) - Python 编写的 Elasticsearch 蜜罐 + - [ESPot](https://github.com/mycert/ESPot) - 一个用 NodeJS 编写的 Elasticsearch 蜜罐,用于对 CVE-2014-3120 的利用 + - [ElasticPot](https://gitlab.com/bontchev/elasticpot) - Elasticsearch 蜜罐 + - [Elastic honey](https://github.com/jordan-wright/elastichoney) - 简单的 Elasticsearch 蜜罐 + - [MongoDB-HoneyProxy](https://github.com/Plazmaz/MongoDB-HoneyProxy) - MongoDB 蜜罐代理 + - [NoSQLpot](https://github.com/torque59/nosqlpot) - NoSQL 蜜罐框架 + - [mysql-honeypotd](https://github.com/sjinks/mysql-honeypotd) - C 编写的低交互 MySQL 蜜罐 + - [MysqlPot](https://github.com/schmalle/MysqlPot) - MySQL 蜜罐 + - [pghoney](https://github.com/betheroot/pghoney) - 低交互 Postgres 蜜罐 + - [sticky_elephant](https://github.com/betheroot/sticky_elephant) - 中交互 postgresql 蜜罐 + - [RedisHoneyPot](https://github.com/cypwnpwnsocute/RedisHoneyPot) - 高交互 Redis 蜜罐 + +- Web 蜜罐 + - [Express honeypot](https://github.com/christophe77/express-honeypot) - 使用 nodeJS 和 express 实现的 RFI & LFI 蜜罐 + - [EoHoneypotBundle](https://github.com/eymengunay/EoHoneypotBundle) - Symfony2 类型的蜜罐 + - [Glastopf](https://github.com/mushorg/glastopf) - Web 应用蜜罐 + - [Google Hack Honeypot](http://ghh.sourceforge.net) - 旨在提供针对那些使用搜索引擎探测资源的攻击者的侦察 + - [HellPot](https://github.com/yunginnanet/HellPot) - 试图让请求位置的 Bot 和客户端崩溃的蜜罐 + - [Laravel Application Honeypot](https://github.com/msurguy/Honeypot) - Honeypot - Laravel 应用程序的简单垃圾邮件预防软件包 + - [Nodepot](https://github.com/schmalle/Nodepot) - NodeJS Web 应用蜜罐 + - [PasitheaHoneypot](https://github.com/Marist-Innovation-Lab/PasitheaHoneypot) - RestAPI 蜜罐 + - [Servletpot](https://github.com/schmalle/servletpot) - Web 应用蜜罐 + - [Shadow Daemon](https://shadowd.zecure.org/overview/introduction/) - 用于 PHP、Perl 和 Python 应用程序的模块化Web应用程序防火墙/高交互式蜜罐 + - [StrutsHoneypot](https://github.com/Cymmetria/StrutsHoneypot) - 基于 Struts Apache 2 的蜜罐 + - [WebTrap](https://github.com/IllusiveNetworks-Labs/WebTrap) - 旨在创建欺骗性网页,重定向到真实网站 + - [basic-auth-pot (bap)](https://github.com/bjeborn/basic-auth-pot) bap - HTTP 基本认证蜜罐 + - [bwpot](https://github.com/graneed/bwpot) - Web 应用蜜罐 + - [django-admin-honeypot](https://github.com/dmpayton/django-admin-honeypot) - 虚假的 Django 管理登录页面,记录未经授权的访问尝试 + - [drupo](https://github.com/d1str0/drupot) - Drupal 蜜罐 + - [galah](https://github.com/0x4D31/galah) - 基于 OpneAI API 的大语言模型(LLM)驱动的蜜罐 + - [honeyhttpd](https://github.com/bocajspear1/honeyhttpd) - 基于 Python 的 Web 服务器蜜罐构建工具 + - [honeyup](https://github.com/LogoiLab/honeyup) - 模拟不安全网站的 Web 蜜罐 + - [modpot](https://github.com/referefref/modpot) - Modpot 是模块化的 Web 应用蜜罐框架,该框架基于 Golang 与 Gin 开发。 + - [owa-honeypot](https://github.com/joda32/owa-honeypot) - 基于 Flask 的 Outlook Web 蜜罐 + - [phpmyadmin_honeypot](https://github.com/gfoss/phpmyadmin_honeypot) - - 简单有效的 phpMyAdmin 蜜罐 + - [shockpot](https://github.com/threatstream/shockpot) - 检测 Shell Shock 利用尝试的 Web 应用蜜罐 + - [smart-honeypot](https://github.com/freak3dot/smart-honeypot) - PHP 脚本编写的智能蜜罐 + - Snare/Tanner - Glastopf 的后继者 + - [Snare](https://github.com/mushorg/snare) - 下一代高交互 honEypot + - [Tanner](https://github.com/mushorg/tanner) - 评估 SNARE 事件 + - [stack-honeypot](https://github.com/CHH/stack-honeypot) - 将针对垃圾邮件机器人的陷阱插入到响应中 + - [tomcat-manager-honeypot](https://github.com/helospark/tomcat-manager-honeypot) - Tomcat 蜜罐。记录请求并保存攻击者的 WAR 文件 + - WordPress honeypots + - [HonnyPotter](https://github.com/MartinIngesen/HonnyPotter) - WordPress 的登录蜜罐,用于收集和分析失败的登录尝试 + - [HoneyPress](https://github.com/kungfuguapo/HoneyPress) - Docker 容器中基于 Python 的 WordPress 蜜罐 + - [wp-smart-honeypot](https://github.com/freak3dot/wp-smart-honeypot) - 减少垃圾邮件的 WordPress 插件 + - [wordpot](https://github.com/gbrindisi/wordpot) - WordPress 蜜罐 + - [Python-Honeypot](https://github.com/OWASP/Python-Honeypot) - OWASP 蜜罐,自动化欺骗框架 + +- 服务蜜罐 + - [ADBHoney](https://github.com/huuck/ADBHoney) - 安卓低交互蜜罐 + - [AMTHoneypot](https://github.com/packetflare/amthoneypot) - 针对 Intel 的 AMT 固件漏洞(CVE-2017-5689)的蜜罐 + - [ddospot](https://github.com/aelth/ddospot) -反射放大 DDoS 蜜罐,支持 NTP、DNS、SSDP、Chargen 与其他 UDP 协议 + - [dionaea](https://github.com/DinoTools/dionaea) - dionaea 蜜罐的主页 + - [dhp](https://github.com/ciscocsirt/dhp) - 模拟 Docker HTTP API 的简单 Docker 蜜罐 + - [DolosHoneypot](https://github.com/Marist-Innovation-Lab/DolosHoneypot) - SDN 蜜罐 + - [Ensnare](https://github.com/ahoernecke/ensnare) - 易部署的 Ruby 蜜罐 + - [Helix](https://github.com/Zeerg/helix-honeypot) - 具备主动防御能力的 K8s API 蜜罐 + - [honeycomb_plugins](https://github.com/Cymmetria/honeycomb_plugins) - Cymmetria 蜜罐 Honeycomb 插件库 + - [honeydb] (https://honeydb.io/downloads) - 易于部署和配置的多服务蜜罐。用户可以将交互数据回传到 HoneyDB 后端汇集在一处,以便通过 REST API 进行访问 + - [honeyntp](https://github.com/fygrave/honeyntp) - NTP 蜜罐 + - [honeypot-camera](https://github.com/alexbredo/honeypot-camera) - 摄像机蜜罐 + - [honeypot-ftp](https://github.com/alexbredo/honeypot-ftp) - FTP 蜜罐 + - [honeypots](https://github.com/qeeqbox/honeypots) - 一个 pypi 包中有 25 种不同的蜜罐!(DNS、FTP、HTTPPROXY、HTTP、HTTPS、IMAP、MYSQL、POP3、postgres、redis、smb、smtp、socks5、ssh、telnet、vnc、mssql、elastic、ldap、ntp、memcache、snmp、oracle、sip 和 irc) + - [honeytrap](https://github.com/honeytrap/honeytrap) - 用 Go 编写的高级蜜罐框架,可以与其他蜜罐软件连接 + - [HoneyPy](https://github.com/foospidy/HoneyPy) - 低交互蜜罐 + - [Honeygrove](https://github.com/UHH-ISS/honeygrove) - 基于 Twisted 的多用途、模块化蜜罐 + - [Honeyport](https://github.com/securitygeneration/Honeyport) - Bash 和 Python 写成的简单 honeyport + - [Honeyprint](https://github.com/glaslos/honeyprint) - 打印机蜜罐 + - [Lyrebird](https://hub.docker.com/r/lyrebird/honeypot-base/) - 现代高交互蜜罐框架 + - [MICROS honeypot](https://github.com/Cymmetria/micros_honeypot) - 在带有 Oracle Hospitality Simphony 的 Oracle Hospitality Applications (MICROS) 中检测 CVE-2018-2636 的低交互蜜罐 + - [node-ftp-honeypot](https://github.com/christophe77/node-ftp-honeypot) - JavaScript 编写的 FTP 蜜罐 + - [pyrdp](https://github.com/gosecure/pyrdp) - Python 3 实现的 RDP 蜜罐 + - [rdppot](https://github.com/kryptoslogic/rdppot) - RDP 蜜罐 + - [RDPy](https://github.com/citronneur/rdpy) - Python 实现的 RDP 蜜罐 + - [SMB Honeypot](https://github.com/r0hi7/HoneySMB) - 可以捕获类似 Wannacry 的恶意软件的高交互 SMB 蜜罐 + - [Tom's Honeypot](https://github.com/inguardians/toms_honeypot) - 低交互 Python 蜜罐 + - [troje](https://github.com/dutchcoders/troje/) - 在独立的 LXC 容器中运行的蜜罐服务 + - [WebLogic honeypot](https://github.com/Cymmetria/weblogic_honeypot) - 在带有 Oracle WebLogic Server 的 Oracle Fusion Middleware 中检测 CVE-2017-10271 的低交互蜜罐 + - [WhiteFace Honeypot](https://github.com/csirtgadgets/csirtg-honeypot) - 基于 Twisted 开发的针对 WhiteFace 蜜罐 + +- 分布式蜜罐 + - [DemonHunter](https://github.com/RevengeComing/DemonHunter) - 低交互蜜罐服务器 + +- 反蜜罐 + - [canarytokendetector](https://github.com/referefref/canarytokendetector) - 用于检测 Thinkst CanaryTokens 的工具 + - [honeydet](https://github.com/referefref/honeydet) - Golang 编写的基于签名的蜜罐检测工具 + - [kippo_detect](https://github.com/andrew-morris/kippo_detect) - 检测 Kippo 蜜罐 + +- ICS/SCADA 蜜罐 + - [Conpot](https://github.com/mushorg/conpot) - ICS/SCADA 蜜罐 + - [GasPot](https://github.com/sjhilt/GasPot) - Veeder Root Gaurdian AST, 常见于石油、天然气行业 + - [SCADA honeynet](http://scadahoneynet.sourceforge.net) - 建立工业网络的蜜罐 + - [gridpot](https://github.com/sk4ld/gridpot) - 模拟实际电网的开源蜜罐 + - [scada-honeynet](http://www.digitalbond.com/blog/2007/07/24/scada-honeynet-article-in-infragard-publication/) - 模拟流行的 PLC 服务,更好地帮助 SCADA 研究人员了解暴露的控制系统设备的潜在风险 + +- 其他/随机 + - [CitrixHoneypot](https://github.com/MalwareTech/CitrixHoneypot) - 检测记录 CVE-2019-19781 扫描与漏洞利用 + - [Damn Simple Honeypot (DSHP)](https://github.com/naorlivne/dshp) - 带有插件化支持的简单蜜罐 + - [dicompot](https://github.com/nsmfoo/dicompot) - DICOM 蜜罐 + - [IPP Honey](https://gitlab.com/bontchev/ipphoney) - IPP 蜜罐 + - [Log4Pot](https://github.com/thomaspatzke/Log4Pot) - Log4Shell(CVE-2021-44228)蜜罐 + - [Masscanned](https://github.com/ivre/masscanned) - 专注于扫描与 Bot 的低交互蜜罐,能够与 IVRE 很好地集成在一起使用构建类似 GreyNoise 的替代方案 + - [medpot](https://github.com/schmalle/medpot) - HL7 / FHIR honeypot. + - [NOVA](https://github.com/DataSoft/Nova) 看起来像完整系统的蜜罐 + - [OpenFlow Honeypot(OFPot)](https://github.com/upa/ofpot) - 基于 POX 的 OpenFlow 蜜罐,将未使用的IP地址的流量重定向到蜜罐中 + - [OpenCanary](https://pypi.org/project/opencanary/) - 模块化、分布式蜜罐 + - [ciscoasa_honeypot](https://github.com/cymmetria/ciscoasa_honeypot) 用于思科 ASA 低交互蜜罐,检测 CVE-2018-0101 远程代码执行漏洞 + - [miniprint](https://github.com/sa7mon/miniprint) - 打印机中交互蜜罐 + +- 僵尸网络 C&C 工具 + - [Hale](https://github.com/pjlantz/Hale) - 僵尸网络 C&C 监视器 + - [dnsMole](https://code.google.com/archive/p/dns-mole/) - 分析 DNS 流量,检测潜在的僵尸网络 C&C 服务器和受感染的主机 + +- IPv6 攻击检测工具 + - [ipv6-attack-detector](https://github.com/mzweilin/ipv6-attack-detector/) - Honeynet 项目支持的 Googel Summer of Code 2012 项目 + +- 动态代码检查工具包 + - [Frida](https://www.frida.re) - 注入 JavaScript 来探索Windows、Mac、Linux、iOS 和 Android 上的应用程序 + +- 将网站转换为服务器蜜罐 + - [HIHAT](http://hihat.sourceforge.net/) - 将任意 PHP 页面转换成基于 Web 的高交互蜜罐 + +- 恶意软件收集 + - [Kippo-Malware](https://bruteforcelab.com/kippo-malware) - 用于在 Kippo SSH 蜜罐数据库中记录的 URL 上下载恶恶意文件的 Python 脚本 + +- 分布式传感器部署 + - [Community Honey Network](https://communityhoneynetwork.readthedocs.io/en/stable/) - CHN 旨在使部署蜜罐和蜜罐管理变得简单灵活,默认使用 Docker Compose 和 Docker 进行部署 + - [Modern Honey Network](https://github.com/threatstream/mhn) - 分布式 Snort 与蜜罐传感器管理,使用虚拟网络,最小指纹的 SNORT 安装,服务器提供隐形侦察与集中管理 + +- 网络分析工具 + - [Tracexploit](https://code.google.com/archive/p/tracexploit/) - 重放网络数据包 + +- 日志匿名工具 + - [LogAnon](http://code.google.com/archive/p/loganon/) - 日志匿名库 + +- 低交互蜜罐(路由器后门) + - [Honeypot-32764](https://github.com/knalli/honeypot-for-tcp-32764) - 路由器后门蜜罐(TCP 32764). + - [WAPot](https://github.com/lcashdol/WAPot) - 能够观察家庭路由器流量的蜜罐 + +- 蜜罐流量重定向 + - [Honeymole](https://web.archive.org/web/20100326040550/http://www.honeynet.org.pt:80/index.php/HoneyMole) - 部署多个传感器回传流量到集中蜜罐中的工具 + +- HTTPS 代理 + - [mitmproxy](https://mitmproxy.org/) - 拦截、检查、修改、重放流量 + +- 系统插桩 + - [Sysdig](https://sysdig.com/opensource/) - 捕获 Linux 系统的状态与活动,可以进行保存、过滤与分析的开源系统级探索工具 + - [Fibratus](https://github.com/rabbitstack/fibratus) - 用于探索和跟踪 Windows 内核的工具 + +- 检测 USB 恶意传播的蜜罐 + - [Ghost-usb](https://github.com/honeynet/ghost-usb-honeypot) - 检测通过 USB 存储设备传播恶意软件的蜜罐 + +- 数据采集 + - [Kippo2MySQL](https://bruteforcelab.com/kippo2mysql) - 从 Kippo 的日志文件中提取一些基本的统计信息插入到数据库中 + - [Kippo2ElasticSearch](https://bruteforcelab.com/kippo2elasticsearch) - 用于将 Kippo SSH 蜜罐数据从 MySQL 数据库传输到 ElasticSearch 实例(服务器或集群)的 Python 脚本 + +- 被动网络审计框架解析工具 + - [Passive Network Audit Framework(pnaf)](https://github.com/jusafing/pnaf) - 被动网络审计框架 + +- 虚拟机监控工具 + - [Antivmdetect](https://github.com/nsmfoo/antivmdetection) - 用于创建 VirtualBox 虚拟机模版的脚本,使检测虚拟机更困难 + - [VMCloak](https://github.com/hatching/vmcloak) - Cuckoo 沙盒的自动虚拟机生成和隐藏 + - [vmitools](http://libvmi.com/) - 带有 Python 接口的 C 库,可以轻松监视运行中的虚拟机的底层细节 + +- 二进制调试器 + - [Hexgolems - Pint Debugger Backend](https://github.com/hexgolems/pint) - 一个调试器后端与 Pin 的 Lua 接口 + - [Hexgolems - Schem Debugger Frontend](https://github.com/hexgolems/schem) - 一个调试器前端 + +- 移动应用分析工具 + - [Androguard](https://github.com/androguard/androguard) - 安卓应用程序逆向工程工具 + - [APKinspector](https://github.com/honeynet/apkinspector/) - 带有界面的安卓应用程序分析工具 + +- 低交互蜜罐 + - [Honeyperl](https://sourceforge.net/projects/honeyperl/) - 基于 Perl 的蜜罐,有很多插件 + - [T-Pot](https://github.com/dtag-dev-sec/tpotce) - 为电信服务商 T-Mobile 提供的蜜罐 + - [beelzebub](https://github.com/mariocandela/beelzebub) - 蜜罐框架,支持通过 YAML 进行配置 🚀 + +- 蜜罐数据融合 + - [HFlow2](https://projects.honeynet.org/hflow) - 用于蜜罐/网络分析的数据融合工具 + +- 服务器 + - [Amun](http://amunhoney.sourceforge.net) - 漏洞模拟蜜罐 + - [Artillery](https://github.com/trustedsec/artillery/) - 开源蓝队工具,旨在通过多种办法保护 Linux 和 Windows 操作系统 + - [Bait and Switch](http://baitnswitch.sourceforge.net) - 将恶意流量重定向到生产系统镜像的蜜罐 + - [Bifrozt](https://github.com/Ziemeck/bifrozt-ansible) - 自动部署带有 ansible 的 bifrozt + - [Conpot](http://conpot.org/) - 低交互的工业控制系统蜜罐 + - [Heralding](https://github.com/johnnykv/heralding) - 捕获凭据的蜜罐 + - [HoneyWRT](https://github.com/CanadianJeff/honeywrt) - 基于 Python 的低交互蜜罐,旨在模拟攻击者可能攻击的服务或端口 + - [Honeyd](https://github.com/provos/honeyd) 请查看[更多 honeyd 工具](#honeyd) + - [Honeysink](http://www.honeynet.org/node/773) - 开源网络陷阱,提供了检测与阻止指定网络上恶意流量的机制 + - [Hontel](https://github.com/stamparm/hontel) - Telnet 蜜罐 + - [KFSensor](http://www.keyfocus.net/kfsensor/) - 基于 Windows 的入侵检测系统蜜罐 + - [LaBrea](http://labrea.sourceforge.net/labrea-info.html) - 接管未使用的 IP 地址,创建对蠕虫、黑客有吸引力的虚拟服务 + - [MTPot](https://github.com/Cymmetria/MTPot) - 专注于 Mirai 的开源 Telnet 蜜罐 + - [SIREN](https://github.com/blaverick62/SIREN) - 半智能蜜罐网络 - 蜜网只能虚拟环境 + - [TelnetHoney](https://github.com/balte/TelnetHoney) - 简单的 telnet 蜜罐 + - [UDPot Honeypot](https://github.com/jekil/UDPot) - 简单 UDP / DNS 蜜罐脚本 + - [Yet Another Fake Honeypot (YAFH)](https://github.com/fnzv/YAFH) - 使用 Go 编写的简单蜜罐 + - [arctic-swallow](https://github.com/ajackal/arctic-swallow) - 低交互蜜罐 + - [fapro](https://github.com/fofapro/fapro) - 虚假协议服务器 + - [glutton](https://github.com/mushorg/glutton) - 可喂食蜜罐 + - [go-HoneyPot](https://github.com/Mojachieee/go-HoneyPot) - 使用 Go 编写的蜜罐 + - [go-emulators](https://github.com/kingtuna/go-emulators) - Go 蜜罐模拟器 + - [honeymail](https://github.com/sec51/honeymail) - 使用 Go 编写的 SMTP 蜜罐 + - [honeytrap](https://github.com/tillmannw/honeytrap) - 一个用于捕获针对 TCP 和 UDP 服务攻击的低交互蜜罐 + - [imap-honey](https://github.com/yvesago/imap-honey) - 使用 Go 编写的 IMAP 蜜罐 + - [mwcollectd](https://www.openhub.net/p/mwcollectd) - 联合 nepenthes 和 honeytrap 的最佳功能实现的多功能恶意软件收集蜜罐 + - [potd](https://github.com/lnslbrty/potd) - 使用 Linux 的 Namespaces、Seccomp 与 Capabilities 构建针对 OpenWrt/IoT 设备的低中交互 SSH/TCP 蜜罐 + - [portlurker](https://github.com/bartnv/portlurker) - 用于协议猜测和安全字符显示的端口监听工具/蜜罐 + - [slipm-honeypot](https://github.com/rshipp/slipm-honeypot) - 简单的低交互端口监听蜜罐 + - [telnet-iot-honeypot](https://github.com/Phype/telnet-iot-honeypot) - 为了捕获僵尸网络二进制文件,使用 Python 编写的 telnet 蜜罐 + - [telnetlogger](https://github.com/robertdavidgraham/telnetlogger) - 跟踪 Mirai 的 Telnet 蜜罐 + - [vnclowpot](https://github.com/magisterquis/vnclowpot) - 低交互的 VNC 蜜罐 + +- IDS 签名生成 + - [Honeycomb](http://www.icir.org/christian/honeycomb/) - 使用蜜罐自动创建签名 + +- 查找服务提供商的 ASN 与前缀 + - [CC2ASN](http://www.cc2asn.com/) - 属于世界上任何给定国家的 AS 编号和前缀的查询服务 + +- 数据收集/数据共享 + - [HPfriends](http://hpfriends.honeycloud.net/#/home) - 蜜罐数据共享平台 + - [hpfriends](https://heipei.io/sigint-hpfriends/) - 关于 HPFriends feed 系统的介绍 + - [HPFeeds](https://github.com/rep/hpfeeds/) - 轻量认证的订阅发布协议 + +- 集中管理工具 + - [PHARM](http://www.nepenthespharm.com/) - 管理、统计、分析你的分布式 Nepenthes 蜜罐 + +- 网络连接分析工具 + - [Impost](http://impost.sourceforge.net/) - 网络安全审计工具,用于取证分析被破坏/易受攻击的守护进程 + +- 蜜罐部署 + - [honeyfs](https://github.com/referefref/honeyfs) - 为中/高交互蜜罐创建文件系统的工具 + - [Modern Honeynet Network](http://threatstream.github.io/mhn/) - 让蜜罐的管理与部署更简单 + +- Wireshark 的蜜罐扩展 + - [Wireshark Extensions](https://www.honeynet.org/project/WiresharkExtensions) - 支持应用针对 PCAP 文件的 Snort IDS 规则与签名 + +- 客户端蜜罐 + - [CWSandbox / GFI Sandbox](https://www.gfi.com/products-and-solutions/all-products) + - [Capture-HPC-Linux](https://redmine.honeynet.org/projects/linux-capture-hpc/wiki) + - [Capture-HPC-NG](https://github.com/CERT-Polska/HSN-Capture-HPC-NG) + - [Capture-HPC](https://projects.honeynet.org/capture-hpc) - 高交互客户端蜜罐 + - [HoneyBOT](http://www.atomicsoftwaresolutions.com/) + - [HoneyC](https://projects.honeynet.org/honeyc) + - [HoneySpider Network](https://github.com/CERT-Polska/hsn2-bundle) - 集成多个客户端蜜罐检测恶意网站的可扩展系统 + - [HoneyWeb](https://code.google.com/archive/p/gsoc-honeyweb/) - 为管理与远程共享 Honeyclients 资源而创建的 Web 界面 + - [Jsunpack-n](https://github.com/urule99/jsunpack-n) + - [MonkeySpider](http://monkeyspider.sourceforge.net) + - [PhoneyC](https://github.com/honeynet/phoneyc) + - [Pwnypot](https://github.com/shjalayeri/pwnypot) - 高交互客户端蜜罐 + - [Rumal](https://github.com/thugs-rumal/) + - [Shelia](https://www.cs.vu.nl/~herbertb/misc/shelia/) + - [Thug](https://buffer.github.io/thug/) + - [Thug Distributed Task Queuing](https://thug-distributed.readthedocs.io/en/latest/index.html) + - [Trigona](https://www.honeynet.org/project/Trigona) + - [URLQuery](https://urlquery.net/) + - [YALIH (Yet Another Low Interaction Honeyclient)](https://github.com/Masood-M/yalih) - 低交互客户端蜜罐,旨在通过签名,异常和模式匹配技术检测恶意网站 + +- 蜜罐 + - [Deception Toolkit](http://www.all.net/dtk/dtk.html) + - [IMHoneypot](https://github.com/mushorg/imhoneypot) + +- PDF 文档检查工具 + - [peepdf](https://github.com/jesparza/peepdf) + +- 混合低/高交互蜜罐 + - [HoneyBrid](http://honeybrid.sourceforge.net) + +- SSH 蜜罐 + - [Blacknet](https://github.com/morian/blacknet) - SSH 蜜罐系统 + - [Cowrie](https://github.com/cowrie/cowrie) - Cowrie SSH 蜜罐 (基于 kippo) + - [DShield docker](https://github.com/xme/dshield-docker) - 启用了 DShield 输出的 Docker 容器 + - [endlessh](https://github.com/skeeto/endlessh) - SSH 蜜罐,支持([docker](https://hub.docker.com/r/linuxserver/endlessh))镜像 + - [HonSSH](https://github.com/tnich/honssh) - 记录客户端与服务器之间所有 SSH 通信 + - [HUDINX](https://github.com/Cryptix720/HUDINX) - 用于记录暴力破解的低交互 SSH 蜜罐,记录攻击者全部 Shell 交互 + - [Kippo](https://github.com/desaster/kippo) - 中交互 SSH 蜜罐 + - [Kippo_JunOS](https://github.com/gregcmartin/Kippo_JunOS) - 基于 Kippo 的蜜罐 + - [Kojoney2](https://github.com/madirish/kojoney2) - Jose Antonio Coret 使用 Python 编写,基于 Kojoney 的低交互 SSH 蜜罐 + - [Kojoney](http://kojoney.sourceforge.net/) - 基于 Python 的低交互蜜罐,使用 Twisted Conch 模拟 SSH 服务 + - [Longitudinal Analysis of SSH Cowrie Honeypot Logs](https://github.com/deroux/longitudinal-analysis-cowrie) - 基于 Python 的命令行工具,用于分析一段时间内的 cowrie 日志 + - [LongTail Log Analysis @ Marist College](http://longtail.it.marist.edu/honey/) - 分析 SSH 蜜罐日志 + - [Malbait](https://github.com/batchmcnulty/Malbait) - 使用 Perl 实现的 TCP/UDP 蜜罐 + - [MockSSH](https://github.com/ncouture/MockSSH) - 支持定义的所有命令的 SSH 服务器 + - [cowrie2neo](https://github.com/xlfe/cowrie2neo) - 解析 cowrie 蜜罐日志到 neo4j 数据库 + - [go-sshoney](https://github.com/ashmckenzie/go-sshoney) - SSH 蜜罐 + - [go0r](https://github.com/fzerorubigd/go0r) - 使用 Go 编写的简单 SSH 蜜罐 + - [gohoney](https://github.com/PaulMaddox/gohoney) - 使用 Go 编写的 SSH 蜜罐 + - [hived](https://github.com/sahilm/hived) - 基于 Go 编写的蜜罐 + - [hnypots-agent)](https://github.com/joshrendek/hnypots-agent) - 记录用户名和密码组合的 SSH 服务器 + - [honeypot.go](https://github.com/mdp/honeypot.go) - 使用 Go 编写的 SSH 蜜罐 + - [honeyssh](https://github.com/ppacher/honeyssh) - 凭据 dumping 的 SSH 蜜罐 + - [hornet](https://github.com/czardoz/hornet) - 支持多虚拟主机的中交互 SSH 蜜罐 + - [ssh-auth-logger](https://github.com/JustinAzoff/ssh-auth-logger) - 低\零交互 SSH 蜜罐 + - [ssh-honeypot](https://github.com/droberson/ssh-honeypot) - 伪造 SSHD,记录 IP 地址、用户名与密码 + - [ssh-honeypot](https://github.com/amv42/sshd-honeypot) - OpenSSH DEAMON 的改版,将命令转发到 Cowrie + - [ssh-honeypotd](https://github.com/sjinks/ssh-honeypotd) - C 编写的低交互 SSH 蜜罐 + - [sshForShits](https://github.com/traetox/sshForShits) - 高交互 SSH 蜜罐框架 + - [sshesame](https://github.com/jaksi/sshesame) - 记录登录活动的虚假 SSH 服务器 + - [sshhipot](https://github.com/magisterquis/sshhipot) - 高交互中间人 SSH 蜜罐 + - [sshlowpot](https://github.com/magisterquis/sshlowpot) - Go 编写的低交互 SSH 蜜罐 + - [sshsyrup](https://github.com/mkishere/sshsyrup) - 简单的 SSH 蜜罐,捕获终端活动并上传到 asciinema.org + - [twisted-honeypots](https://github.com/lanjelot/twisted-honeypots) - 基于 Twisted 的 SSH\FTP\Telnet 的蜜罐 + +- 分布式传感器项目 + - [DShield Web Honeypot Project](https://sites.google.com/site/webhoneypotsite/) + +- PCAP 分析工具 + - [Honeysnap](https://projects.honeynet.org/honeysnap/) + +- 网络流量重定向工具 + - [Honeywall](https://projects.honeynet.org/honeywall/) + +- 混合内容的分布式蜜罐 + - [HoneyDrive](https://bruteforcelab.com/honeydrive) + +- 蜜罐传感器 + - [Honeeepi](https://redmine.honeynet.org/projects/honeeepi/wiki) - Raspberry Pi 上一款基于定制 Raspbian 操作系统的蜜罐 + +- File carving + - [TestDisk & PhotoRec](https://www.cgsecurity.org/) + +- Windows 可用的行为分析工具 + - [Capture BAT](https://www.honeynet.org/node/315) + +- Live CD + - [DAVIX](https://www.secviz.org/node/89) - DAVIX Released + +- Spamtrap + - [Mail::SMTP::Honeypot](https://metacpan.org/pod/release/MIKER/Mail-SMTP-Honeypot-0.11/Honeypot.pm) - 提供标准 SMTP 服务器工具的 Perl 模块 + - [Mailoney](https://github.com/awhitehatter/mailoney) - Python 编写的 SMTP 蜜罐,具有开放中继、凭据记录等功能 + - [SendMeSpamIDS.py](https://github.com/johestephan/VerySimpleHoneypot) - 获得所有 IDS 和分析设备的简单 SMTP + - [Shiva](https://github.com/shiva-spampot/shiva) - 垃圾邮件蜜罐与智能分析工具 + - [Shiva The Spam Honeypot Tips And Tricks For Getting It Up And Running](https://www.pentestpartners.com/security-blog/shiva-the-spam-honeypot-tips-and-tricks-for-getting-it-up-and-running/) + - [SMTPLLMPot](https://github.com/referefref/SMTPLLMPot) - 使用 GPT 3.5 的简单 SMTP 蜜罐 + - [SpamHAT](https://github.com/miguelraulb/spamhat) - 垃圾邮件蜜罐工具 + - [Spamhole](http://www.spamhole.net/) + - [honeypot](https://github.com/jadb/honeypot) - 蜜罐项目组非官方 PHP 的 SDK + - [spamd](http://man.openbsd.org/cgi-bin/man.cgi?query=spamd%26apropos=0%26sektion=0%26manpath=OpenBSD+Current%26arch=i386%26format=html) + +- 商业蜜网 + - [Cymmetria Mazerunner](https://cymmetria.com/products/mazerunner/) - 可引导攻击者远离真实目标,并创建攻击痕迹跟踪 + +- 服务器(蓝牙) + - [Bluepot](https://github.com/andrewmichaelsmith/bluepot) + +- Android 应用程序动态分析 + - [Droidbox](https://code.google.com/archive/p/droidbox/) + +- Docker 化的低交互蜜罐 + - [Docker honeynet](https://github.com/sreinhardt/Docker-Honeynet) - 部署与 Docker 容器中的一些蜜网工具 + - [Dockerized Thug](https://hub.docker.com/r/honeynet/thug/) - 基于 [Thug](https://github.com/buffer/thug) 的 Docker 蜜罐,用于分析恶意 Web 内容 + - [Dockerpot](https://github.com/mrschyte/dockerpot) - 基于 Docker 的蜜罐 + - [Manuka](https://github.com/andrewmichaelsmith/manuka) - 基于 Docker 的蜜罐 (Dionaea & Kippo) + - [honey_ports](https://github.com/run41/honey_ports) - 利用 Docker 进行蜜罐的部署发现端口扫描简单有效的办法 + - [mhn-core-docker](https://github.com/MattCarothers/mhn-core-docker) - 在 Docker 中实现的现代蜜网核心元素 + +- 网络分析 + - [Quechua](https://bitbucket.org/zaccone/quechua) + +- SIP Server + - [Artemnesia VoIP](http://artemisa.sourceforge.net) + +- SIP + - [SentryPeer](https://github.com/SentryPeer/SentryPeer) - 保护 SIP 服务器免于攻击 + +- IOT 蜜罐 + - [HoneyThing](https://github.com/omererdem/honeything) - TR-069 蜜罐 + - [Kako](https://github.com/darkarnium/kako) - 常见嵌入式设备漏洞的蜜罐 + +- Honeytokens + - [CanaryTokens](https://github.com/thinkst/canarytokens) - Honeytoken 生成器,Dashboard 在 [CanaryTokens.org](https://canarytokens.org/generate) + - [Honeybits](https://github.com/0x4D31/honeybits) - 旨在通过在生产服务器和工作站中传播 breadcrumbs 和 honeytokens 来诱使攻击者进入蜜罐,从而提高诱捕率 + - [Honeyλ (HoneyLambda)](https://github.com/0x4D31/honeylambda) - 简单的无服务器应用程序,旨在创建和监控 AWS Lambda 和 Amazon API Gateway 之上的网址 honeytokens + - [dcept](https://github.com/secureworks/dcept) - 部署、检测活动目录使用情况的 honeytokens + - [honeyku](https://github.com/0x4D31/honeyku) - 基于 Heroku 的 Web 蜜罐 + +## Honeyd工具 + +- Honeyd 插件 + - [Honeycomb](http://www.honeyd.org/tools.php) + +- Honeyd 查看工具 + - [Honeyview](http://honeyview.sourceforge.net/) + +- Honeyd 与 MySQL 的连接 + - [Honeyd2MySQL](https://bruteforcelab.com/honeyd2mysql) + +- Honeyd 统计数据可视化脚本 + - [Honeyd-Viz](https://bruteforcelab.com/honeyd-viz) + +- Honeyd 统计 + - [Honeydsum.pl](https://github.com/DataSoft/Honeyd/blob/master/scripts/misc/honeydsum-v0.3/honeydsum.pl) + + +## 网络与行为分析 + +- 沙盒 + - [Argos](http://www.few.vu.nl/argos/) - 用于捕获零日攻击的模拟器 + - [COMODO automated sandbox](https://help.comodo.com/topic-72-1-451-4768-.html) + - [Cuckoo](https://cuckoosandbox.org/) - 领先的开源自动化恶意软件分析系统 + - [Pylibemu](https://github.com/buffer/pylibemu) - Libemu Cython + - [RFISandbox](https://monkey.org/~jose/software/rfi-sandbox/) - 使用 PHP 5.x 脚本在 [funcall](https://pecl.php.net/package/funcall) 上构建的沙盒 + - [dorothy2](https://github.com/m4rco-/dorothy2) - Ruby 编写的恶意软件/僵尸网络分析框架 + - [imalse](https://github.com/hbhzwj/imalse) - 集成的恶意软件仿真工具与模拟工具 + - [libemu](https://github.com/buffer/libemu) - Shellcode 模拟库,对 Shellcode 检测十分有用 + +- 沙盒即服务 + - [Hybrid Analysis](https://www.hybrid-analysis.com) - 由 Payload Security 提供的免费恶意软件分析服务,可使用其独特的混合分析技术检测和分析未知威胁 + - [Joebox Cloud](https://jbxcloud.joesecurity.org/login) - 确定 Windows、Android 和 Mac OS X 上的恶意文件(包括 PE、PDF、DOC、PPT、XLS、APK、URL 和 MachO)的行为,判断其是否存在可疑活动 + - [VirusTotal](https://www.virustotal.com/) + - [malwr.com](https://malwr.com/) - 提供免费恶意软件分析服务与社区 + +## 数据分析工具 + +- 前端 + - [DionaeaFR](https://github.com/rubenespadas/DionaeaFR) - Dionaea 蜜罐前端 Web + - [Django-kippo](https://github.com/jedie/django-kippo) - 用于 kippo SSH 蜜罐的 Django 程序 + - [Shockpot-Frontend](https://github.com/GovCERT-CZ/Shockpot-Frontend) - 用于可视化 Shockpot 蜜罐中数据的脚本 + - [Tango](https://github.com/aplura/Tango) - 使用 Splunk 处理蜜罐情报 + - [Wordpot-Frontend](https://github.com/GovCERT-CZ/Wordpot-Frontend) - 用于可视化 Wordpot 蜜罐中数据的脚本 + - [honeyalarmg2](https://github.com/schmalle/honeyalarmg2) - 用于显示蜜罐数据的简化 UI + - [honeypotDisplay](https://github.com/Joss-Steward/honeypotDisplay) - 展示 SSH 蜜罐的 Flask 网站 + +- 可视化 + - [Acapulco](https://github.com/hgascon/acapulco) - 自动攻击群体图构建 + - [Afterglow Cloud](https://github.com/ayrus/afterglow-cloud) + - [Afterglow](http://afterglow.sourceforge.net/) + - [Glastopf Analytics](https://github.com/katkad/Glastopf-Analytics) - 简单蜜罐统计 + - [HoneyMalt](https://github.com/SneakersInc/HoneyMalt) - Maltego 转换映射蜜罐系统 + - [HoneyMap](https://github.com/fw42/honeymap) - 显示实时 Websocket 流的 SVG 地图 + - [HoneyStats](https://sourceforge.net/projects/honeystats/) - Honeynet 的统计视图 + - [HpfeedsHoneyGraph](https://github.com/yuchincheng/HpfeedsHoneyGraph) - 可视化 hpfeeds 日志的程序 + - [IVRE](https://github.com/ivre/ivre) - 由 @cea-sec 和 @ANSSI-FR 开发的网络侦察框架,作为 Criminalip/Shodan/ZoomEye/Censys 和 GreyNoise 的替代方案,收集各种情报 + - [Kippo stats](https://github.com/mfontani/kippo-stats) - 为 kippo SSH 蜜罐展示数据的程序 + - [Kippo-Graph](https://bruteforcelab.com/kippo-graph) - 用于可视化 Kippo 蜜罐中数据的脚本 + - [The Intelligent HoneyNet](https://github.com/jpyorre/IntelligentHoneyNet) - 试图创建蜜罐中可操作信息的智能蜜网项目 + - [ovizart](https://github.com/oguzy/ovizart) - 可视化网络流量分析 + +## 指南 + +- [T-Pot: 多蜜罐平台](https://dtag-dev-sec.github.io/mediator/feature/2015/03/17/concept.html) +- [蜜罐 (Dionaea and kippo) 设置脚本](https://github.com/andrewmichaelsmith/honeypot-setup-script/) + +- 部署 + - [Dionaea and EC2 in 20 Minutes](http://andrewmichaelsmith.com/2012/03/dionaea-honeypot-on-ec2-in-20-minutes/) - 在 EC2 上设置 Dionaea 的教程 + - [Using a Raspberry Pi honeypot to contribute data to DShield/ISC](https://isc.sans.edu/diary/22680) - 基于 Raspberry Pi 的系统可以收集比防火墙日志更丰富的日志 + - [honeypotpi](https://github.com/free5ty1e/honeypotpi) - 将 Raspberry Pi 变成 HoneyPot Pi 的脚本 + +- 研究论文 + - [Honeypot research papers](https://github.com/shbhmsingh72/Honeypot-Research-Papers) - 研究蜜罐论文的 PDF + - [vEYE](https://link.springer.com/article/10.1007%2Fs10115-008-0137-3) - 自传播蠕虫行为痕迹的检测与分析 diff --git a/awesome-check.py b/awesome-check.py new file mode 100755 index 0000000..2bfc921 --- /dev/null +++ b/awesome-check.py @@ -0,0 +1,19 @@ +#!/usr/bin/env python + +import re +import sys +import urllib2 + +with open(sys.argv[1], 'r') as f: + for line in f.readlines(): + if '](http' in line: + for url in re.findall("(http[s?]://[^)]+)", line): + # print url + try: + request = urllib2.Request(url) + request.get_method = lambda : 'HEAD' + resp = urllib2.urlopen(request) + if resp.getcode() != 200: + print 'ERROR - ', line + except urllib2.URLError, e: + print e, line \ No newline at end of file