Initial commit
This commit is contained in:
commit
e6de10f99d
9
.travis.yml
Normal file
9
.travis.yml
Normal file
@ -0,0 +1,9 @@
|
||||
language: ruby
|
||||
rvm:
|
||||
- 2.2
|
||||
before_script:
|
||||
- gem install awesome_bot
|
||||
script:
|
||||
- awesome_bot README.md --white-list https://github.com/sindresorhus/awesome,http://hpfriends.honeycloud.net/#/home,https://malwr.com/
|
||||
- awesome_bot README_CN.md --white-list https://github.com/sindresorhus/awesome,http://hpfriends.honeycloud.net/#/home,https://malwr.com/
|
||||
|
14
CONTRIBUTING.md
Normal file
14
CONTRIBUTING.md
Normal file
@ -0,0 +1,14 @@
|
||||
# Contribution Guidelines
|
||||
|
||||
Please ensure your pull request adheres to the following guidelines:
|
||||
|
||||
- Search previous suggestions before making a new one, as yours may be a duplicate.
|
||||
- Make an individual pull request for each suggestion.
|
||||
- Use the following format: `[PACKAGE](LINK) - DESCRIPTION.`
|
||||
- New categories, or improvements to the existing categorization are welcome.
|
||||
- Keep descriptions short and simple, but descriptive.
|
||||
- End all descriptions with a full stop/period.
|
||||
- Check your spelling and grammar.
|
||||
- Make sure your text editor is set to remove trailing whitespace.
|
||||
|
||||
Your contributions are always welcome! Thank you for your suggestions!
|
202
LICENSE
Normal file
202
LICENSE
Normal file
@ -0,0 +1,202 @@
|
||||
The Artistic License 2.0
|
||||
|
||||
Copyright (c) 2015-2024 jose nazario
|
||||
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
This license establishes the terms under which a given free software
|
||||
Package may be copied, modified, distributed, and/or redistributed.
|
||||
The intent is that the Copyright Holder maintains some artistic
|
||||
control over the development of that Package while still keeping the
|
||||
Package available as open source and free software.
|
||||
|
||||
You are always permitted to make arrangements wholly outside of this
|
||||
license directly with the Copyright Holder of a given Package. If the
|
||||
terms of this license do not permit the full use that you propose to
|
||||
make of the Package, you should contact the Copyright Holder and seek
|
||||
a different licensing arrangement.
|
||||
|
||||
Definitions
|
||||
|
||||
"Copyright Holder" means the individual(s) or organization(s)
|
||||
named in the copyright notice for the entire Package.
|
||||
|
||||
"Contributor" means any party that has contributed code or other
|
||||
material to the Package, in accordance with the Copyright Holder's
|
||||
procedures.
|
||||
|
||||
"You" and "your" means any person who would like to copy,
|
||||
distribute, or modify the Package.
|
||||
|
||||
"Package" means the collection of files distributed by the
|
||||
Copyright Holder, and derivatives of that collection and/or of
|
||||
those files. A given Package may consist of either the Standard
|
||||
Version, or a Modified Version.
|
||||
|
||||
"Distribute" means providing a copy of the Package or making it
|
||||
accessible to anyone else, or in the case of a company or
|
||||
organization, to others outside of your company or organization.
|
||||
|
||||
"Distributor Fee" means any fee that you charge for Distributing
|
||||
this Package or providing support for this Package to another
|
||||
party. It does not mean licensing fees.
|
||||
|
||||
"Standard Version" refers to the Package if it has not been
|
||||
modified, or has been modified only in ways explicitly requested
|
||||
by the Copyright Holder.
|
||||
|
||||
"Modified Version" means the Package, if it has been changed, and
|
||||
such changes were not explicitly requested by the Copyright
|
||||
Holder.
|
||||
|
||||
"Original License" means this Artistic License as Distributed with
|
||||
the Standard Version of the Package, in its current version or as
|
||||
it may be modified by The Perl Foundation in the future.
|
||||
|
||||
"Source" form means the source code, documentation source, and
|
||||
configuration files for the Package.
|
||||
|
||||
"Compiled" form means the compiled bytecode, object code, binary,
|
||||
or any other form resulting from mechanical transformation or
|
||||
translation of the Source form.
|
||||
|
||||
|
||||
Permission for Use and Modification Without Distribution
|
||||
|
||||
(1) You are permitted to use the Standard Version and create and use
|
||||
Modified Versions for any purpose without restriction, provided that
|
||||
you do not Distribute the Modified Version.
|
||||
|
||||
|
||||
Permissions for Redistribution of the Standard Version
|
||||
|
||||
(2) You may Distribute verbatim copies of the Source form of the
|
||||
Standard Version of this Package in any medium without restriction,
|
||||
either gratis or for a Distributor Fee, provided that you duplicate
|
||||
all of the original copyright notices and associated disclaimers. At
|
||||
your discretion, such verbatim copies may or may not include a
|
||||
Compiled form of the Package.
|
||||
|
||||
(3) You may apply any bug fixes, portability changes, and other
|
||||
modifications made available from the Copyright Holder. The resulting
|
||||
Package will still be considered the Standard Version, and as such
|
||||
will be subject to the Original License.
|
||||
|
||||
|
||||
Distribution of Modified Versions of the Package as Source
|
||||
|
||||
(4) You may Distribute your Modified Version as Source (either gratis
|
||||
or for a Distributor Fee, and with or without a Compiled form of the
|
||||
Modified Version) provided that you clearly document how it differs
|
||||
from the Standard Version, including, but not limited to, documenting
|
||||
any non-standard features, executables, or modules, and provided that
|
||||
you do at least ONE of the following:
|
||||
|
||||
(a) make the Modified Version available to the Copyright Holder
|
||||
of the Standard Version, under the Original License, so that the
|
||||
Copyright Holder may include your modifications in the Standard
|
||||
Version.
|
||||
|
||||
(b) ensure that installation of your Modified Version does not
|
||||
prevent the user installing or running the Standard Version. In
|
||||
addition, the Modified Version must bear a name that is different
|
||||
from the name of the Standard Version.
|
||||
|
||||
(c) allow anyone who receives a copy of the Modified Version to
|
||||
make the Source form of the Modified Version available to others
|
||||
under
|
||||
|
||||
(i) the Original License or
|
||||
|
||||
(ii) a license that permits the licensee to freely copy,
|
||||
modify and redistribute the Modified Version using the same
|
||||
licensing terms that apply to the copy that the licensee
|
||||
received, and requires that the Source form of the Modified
|
||||
Version, and of any works derived from it, be made freely
|
||||
available in that license fees are prohibited but Distributor
|
||||
Fees are allowed.
|
||||
|
||||
|
||||
Distribution of Compiled Forms of the Standard Version
|
||||
or Modified Versions without the Source
|
||||
|
||||
(5) You may Distribute Compiled forms of the Standard Version without
|
||||
the Source, provided that you include complete instructions on how to
|
||||
get the Source of the Standard Version. Such instructions must be
|
||||
valid at the time of your distribution. If these instructions, at any
|
||||
time while you are carrying out such distribution, become invalid, you
|
||||
must provide new instructions on demand or cease further distribution.
|
||||
If you provide valid instructions or cease distribution within thirty
|
||||
days after you become aware that the instructions are invalid, then
|
||||
you do not forfeit any of your rights under this license.
|
||||
|
||||
(6) You may Distribute a Modified Version in Compiled form without
|
||||
the Source, provided that you comply with Section 4 with respect to
|
||||
the Source of the Modified Version.
|
||||
|
||||
|
||||
Aggregating or Linking the Package
|
||||
|
||||
(7) You may aggregate the Package (either the Standard Version or
|
||||
Modified Version) with other packages and Distribute the resulting
|
||||
aggregation provided that you do not charge a licensing fee for the
|
||||
Package. Distributor Fees are permitted, and licensing fees for other
|
||||
components in the aggregation are permitted. The terms of this license
|
||||
apply to the use and Distribution of the Standard or Modified Versions
|
||||
as included in the aggregation.
|
||||
|
||||
(8) You are permitted to link Modified and Standard Versions with
|
||||
other works, to embed the Package in a larger work of your own, or to
|
||||
build stand-alone binary or bytecode versions of applications that
|
||||
include the Package, and Distribute the result without restriction,
|
||||
provided the result does not expose a direct interface to the Package.
|
||||
|
||||
|
||||
Items That are Not Considered Part of a Modified Version
|
||||
|
||||
(9) Works (including, but not limited to, modules and scripts) that
|
||||
merely extend or make use of the Package, do not, by themselves, cause
|
||||
the Package to be a Modified Version. In addition, such works are not
|
||||
considered parts of the Package itself, and are not subject to the
|
||||
terms of this license.
|
||||
|
||||
|
||||
General Provisions
|
||||
|
||||
(10) Any use, modification, and distribution of the Standard or
|
||||
Modified Versions is governed by this Artistic License. By using,
|
||||
modifying or distributing the Package, you accept this license. Do not
|
||||
use, modify, or distribute the Package, if you do not accept this
|
||||
license.
|
||||
|
||||
(11) If your Modified Version has been derived from a Modified
|
||||
Version made by someone other than you, you are nevertheless required
|
||||
to ensure that your Modified Version complies with the requirements of
|
||||
this license.
|
||||
|
||||
(12) This license does not grant you the right to use any trademark,
|
||||
service mark, tradename, or logo of the Copyright Holder.
|
||||
|
||||
(13) This license includes the non-exclusive, worldwide,
|
||||
free-of-charge patent license to make, have made, use, offer to sell,
|
||||
sell, import and otherwise transfer the Package with respect to any
|
||||
patent claims licensable by the Copyright Holder that are necessarily
|
||||
infringed by the Package. If you institute patent litigation
|
||||
(including a cross-claim or counterclaim) against any party alleging
|
||||
that the Package constitutes direct or contributory patent
|
||||
infringement, then this Artistic License to you shall terminate on the
|
||||
date that such litigation is filed.
|
||||
|
||||
(14) Disclaimer of Warranty:
|
||||
THE PACKAGE IS PROVIDED BY THE COPYRIGHT HOLDER AND CONTRIBUTORS "AS
|
||||
IS' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES. THE IMPLIED
|
||||
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
|
||||
NON-INFRINGEMENT ARE DISCLAIMED TO THE EXTENT PERMITTED BY YOUR LOCAL
|
||||
LAW. UNLESS REQUIRED BY LAW, NO COPYRIGHT HOLDER OR CONTRIBUTOR WILL
|
||||
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL
|
||||
DAMAGES ARISING IN ANY WAY OUT OF THE USE OF THE PACKAGE, EVEN IF
|
||||
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
|
546
README.md
Normal file
546
README.md
Normal file
@ -0,0 +1,546 @@
|
||||
# Awesome Honeypots [](https://github.com/sindresorhus/awesome)
|
||||
|
||||
A curated list of awesome honeypots, plus related components and much more, divided into categories such as Web, services, and others, with a focus on free and open source projects.
|
||||
|
||||
There is no pre-established order of items in each category, the order is for contribution. If you want to contribute, please read the [guide](CONTRIBUTING.md).
|
||||
|
||||
Discover more awesome lists at [sindresorhus/awesome](https://github.com/sindresorhus/awesome).
|
||||
|
||||
# Contents
|
||||
|
||||
- [Awesome Honeypots ](#awesome-honeypots-)
|
||||
- [Contents](#contents)
|
||||
- [Related Lists](#related-lists)
|
||||
- [Honeypots](#honeypots)
|
||||
- [Honeyd Tools](#honeyd-tools)
|
||||
- [Network and Artifact Analysis](#network-and-artifact-analysis)
|
||||
- [Data Tools](#data-tools)
|
||||
- [Guides](#guides)
|
||||
|
||||
## Related Lists
|
||||
|
||||
- [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools) - Useful in network traffic analysis.
|
||||
- [awesome-malware-analysis](https://github.com/rshipp/awesome-malware-analysis) - Some overlap here for artifact analysis.
|
||||
|
||||
## Honeypots
|
||||
|
||||
- Database Honeypots
|
||||
|
||||
- [Delilah](https://github.com/SecurityTW/delilah) - Elasticsearch Honeypot written in Python (originally from Novetta).
|
||||
- [ESPot](https://github.com/mycert/ESPot) - Elasticsearch honeypot written in NodeJS, to capture every attempts to exploit CVE-2014-3120.
|
||||
- [ElasticPot](https://gitlab.com/bontchev/elasticpot) - An Elasticsearch Honeypot.
|
||||
- [Elastic honey](https://github.com/jordan-wright/elastichoney) - Simple Elasticsearch Honeypot.
|
||||
- [MongoDB-HoneyProxy](https://github.com/Plazmaz/MongoDB-HoneyProxy) - MongoDB honeypot proxy.
|
||||
- [NoSQLpot](https://github.com/torque59/nosqlpot) - Honeypot framework built on a NoSQL-style database.
|
||||
- [mysql-honeypotd](https://github.com/sjinks/mysql-honeypotd) - Low interaction MySQL honeypot written in C.
|
||||
- [MysqlPot](https://github.com/schmalle/MysqlPot) - MySQL honeypot, still very early stage.
|
||||
- [pghoney](https://github.com/betheroot/pghoney) - Low-interaction Postgres Honeypot.
|
||||
- [sticky_elephant](https://github.com/betheroot/sticky_elephant) - Medium interaction postgresql honeypot.
|
||||
- [RedisHoneyPot](https://github.com/cypwnpwnsocute/RedisHoneyPot) - High Interaction Honeypot Solution for Redis protocol.
|
||||
|
||||
- Web honeypots
|
||||
|
||||
- [Express honeypot](https://github.com/christophe77/express-honeypot) - RFI & LFI honeypot using nodeJS and express.
|
||||
- [EoHoneypotBundle](https://github.com/eymengunay/EoHoneypotBundle) - Honeypot type for Symfony2 forms.
|
||||
- [Glastopf](https://github.com/mushorg/glastopf) - Web Application Honeypot.
|
||||
- [Google Hack Honeypot](http://ghh.sourceforge.net) - Designed to provide reconnaissance against attackers that use search engines as a hacking tool against your resources.
|
||||
- [HellPot](https://github.com/yunginnanet/HellPot) - Honeypot that tries to crash the bots and clients that visit it's location.
|
||||
- [Laravel Application Honeypot](https://github.com/msurguy/Honeypot) - Simple spam prevention package for Laravel applications.
|
||||
- [Nodepot](https://github.com/schmalle/Nodepot) - NodeJS web application honeypot.
|
||||
- [PasitheaHoneypot](https://github.com/Marist-Innovation-Lab/PasitheaHoneypot) - RestAPI honeypot.
|
||||
- [Servletpot](https://github.com/schmalle/servletpot) - Web application Honeypot.
|
||||
- [Shadow Daemon](https://shadowd.zecure.org/overview/introduction/) - Modular Web Application Firewall / High-Interaction Honeypot for PHP, Perl, and Python apps.
|
||||
- [StrutsHoneypot](https://github.com/Cymmetria/StrutsHoneypot) - Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers.
|
||||
- [WebTrap](https://github.com/IllusiveNetworks-Labs/WebTrap) - Designed to create deceptive webpages to deceive and redirect attackers away from real websites.
|
||||
- [basic-auth-pot (bap)](https://github.com/bjeborn/basic-auth-pot) - HTTP Basic Authentication honeypot.
|
||||
- [bwpot](https://github.com/graneed/bwpot) - Breakable Web applications honeyPot.
|
||||
- [django-admin-honeypot](https://github.com/dmpayton/django-admin-honeypot) - Fake Django admin login screen to notify admins of attempted unauthorized access.
|
||||
- [drupo](https://github.com/d1str0/drupot) - Drupal Honeypot.
|
||||
- [galah](https://github.com/0x4D31/galah) - an LLM-powered web honeypot using the OpenAI API.
|
||||
- [honeyhttpd](https://github.com/bocajspear1/honeyhttpd) - Python-based web server honeypot builder.
|
||||
- [honeyup](https://github.com/LogoiLab/honeyup) - An uploader honeypot designed to look like poor website security.
|
||||
- [modpot](https://github.com/referefref/modpot) - Modpot is a modular web application honeypot framework and management application written in Golang and making use of gin framework.
|
||||
- [owa-honeypot](https://github.com/joda32/owa-honeypot) - A basic flask based Outlook Web Honey pot.
|
||||
- [phpmyadmin_honeypot](https://github.com/gfoss/phpmyadmin_honeypot) - Simple and effective phpMyAdmin honeypot.
|
||||
- [shockpot](https://github.com/threatstream/shockpot) - WebApp Honeypot for detecting Shell Shock exploit attempts.
|
||||
- [smart-honeypot](https://github.com/freak3dot/smart-honeypot) - PHP Script demonstrating a smart honey pot.
|
||||
- Snare/Tanner - successors to Glastopf
|
||||
- [Snare](https://github.com/mushorg/snare) - Super Next generation Advanced Reactive honeypot.
|
||||
- [Tanner](https://github.com/mushorg/tanner) - Evaluating SNARE events.
|
||||
- [stack-honeypot](https://github.com/CHH/stack-honeypot) - Inserts a trap for spam bots into responses.
|
||||
- [tomcat-manager-honeypot](https://github.com/helospark/tomcat-manager-honeypot) - Honeypot that mimics Tomcat manager endpoints. Logs requests and saves attacker's WAR file for later study.
|
||||
- WordPress honeypots
|
||||
- [HonnyPotter](https://github.com/MartinIngesen/HonnyPotter) - WordPress login honeypot for collection and analysis of failed login attempts.
|
||||
- [HoneyPress](https://github.com/kungfuguapo/HoneyPress) - Python based WordPress honeypot in a Docker container.
|
||||
- [wp-smart-honeypot](https://github.com/freak3dot/wp-smart-honeypot) - WordPress plugin to reduce comment spam with a smarter honeypot.
|
||||
- [wordpot](https://github.com/gbrindisi/wordpot) - WordPress Honeypot.
|
||||
- [Python-Honeypot](https://github.com/OWASP/Python-Honeypot) - OWASP Honeypot, Automated Deception Framework.
|
||||
|
||||
- Service Honeypots
|
||||
- [ADBHoney](https://github.com/huuck/ADBHoney) - Low interaction honeypot that simulates an Android device running Android Debug Bridge (ADB) server process.
|
||||
- [AMTHoneypot](https://github.com/packetflare/amthoneypot) - Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689.
|
||||
- [ddospot](https://github.com/aelth/ddospot) - NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot.
|
||||
- [dionaea](https://github.com/DinoTools/dionaea) - Home of the dionaea honeypot.
|
||||
- [dhp](https://github.com/ciscocsirt/dhp) - Simple Docker Honeypot server emulating small snippets of the Docker HTTP API.
|
||||
- [DolosHoneypot](https://github.com/Marist-Innovation-Lab/DolosHoneypot) - SDN (software defined networking) honeypot.
|
||||
- [Ensnare](https://github.com/ahoernecke/ensnare) - Easy to deploy Ruby honeypot.
|
||||
- [Helix](https://github.com/Zeerg/helix-honeypot) - K8s API Honeypot with Active Defense Capabilities.
|
||||
- [honeycomb_plugins](https://github.com/Cymmetria/honeycomb_plugins) - Plugin repository for Honeycomb, the honeypot framework by Cymmetria.
|
||||
- [honeydb] (https://honeydb.io/downloads) - Multi-service honeypot that is easy to deploy and configure. Can be configured to send interaction data to to HoneyDB's centralized collectors for access via REST API.
|
||||
- [honeyntp](https://github.com/fygrave/honeyntp) - NTP logger/honeypot.
|
||||
- [honeypot-camera](https://github.com/alexbredo/honeypot-camera) - Observation camera honeypot.
|
||||
- [honeypot-ftp](https://github.com/alexbredo/honeypot-ftp) - FTP Honeypot.
|
||||
- [honeypots](https://github.com/qeeqbox/honeypots) - 25 different honeypots in a single pypi package! (dns, ftp, httpproxy, http, https, imap, mysql, pop3, postgres, redis, smb, smtp, socks5, ssh, telnet, vnc, mssql, elastic, ldap, ntp, memcache, snmp, oracle, sip and irc).
|
||||
- [honeytrap](https://github.com/honeytrap/honeytrap) - Advanced Honeypot framework written in Go that can be connected with other honeypot software.
|
||||
- [HoneyPy](https://github.com/foospidy/HoneyPy) - Low interaction honeypot.
|
||||
- [Honeygrove](https://github.com/UHH-ISS/honeygrove) - Multi-purpose modular honeypot based on Twisted.
|
||||
- [Honeyport](https://github.com/securitygeneration/Honeyport) - Simple honeyport written in Bash and Python.
|
||||
- [Honeyprint](https://github.com/glaslos/honeyprint) - Printer honeypot.
|
||||
- [Lyrebird](https://hub.docker.com/r/lyrebird/honeypot-base/) - Modern high-interaction honeypot framework.
|
||||
- [MICROS honeypot](https://github.com/Cymmetria/micros_honeypot) - Low interaction honeypot to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS).
|
||||
- [node-ftp-honeypot](https://github.com/christophe77/node-ftp-honeypot) - FTP server honeypot in JS.
|
||||
- [pyrdp](https://github.com/gosecure/pyrdp) - RDP man-in-the-middle and library for Python 3 with the ability to watch connections live or after the fact.
|
||||
- [rdppot](https://github.com/kryptoslogic/rdppot) - RDP honeypot
|
||||
- [RDPy](https://github.com/citronneur/rdpy) - Microsoft Remote Desktop Protocol (RDP) honeypot implemented in Python.
|
||||
- [SMB Honeypot](https://github.com/r0hi7/HoneySMB) - High interaction SMB service honeypot capable of capturing wannacry-like Malware.
|
||||
- [Tom's Honeypot](https://github.com/inguardians/toms_honeypot) - Low interaction Python honeypot.
|
||||
- [Trapster Commmunity](https://github.com/0xBallpoint/trapster-community) - Modural and easy to install Python Honeypot, with comprehensive alerting
|
||||
- [troje](https://github.com/dutchcoders/troje/) - Honeypot that runs each connection with the service within a separate LXC container.
|
||||
- [WebLogic honeypot](https://github.com/Cymmetria/weblogic_honeypot) - Low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware.
|
||||
- [WhiteFace Honeypot](https://github.com/csirtgadgets/csirtg-honeypot) - Twisted based honeypot for WhiteFace.
|
||||
|
||||
- Distributed Honeypots
|
||||
|
||||
- [DemonHunter](https://github.com/RevengeComing/DemonHunter) - Low interaction honeypot server.
|
||||
|
||||
- Anti-honeypot stuff
|
||||
|
||||
- [canarytokendetector](https://github.com/referefref/canarytokendetector) - Tool for detection and nullification of Thinkst CanaryTokens
|
||||
- [honeydet](https://github.com/referefref/honeydet) - Signature based honeypot detector tool written in Golang
|
||||
- [kippo_detect](https://github.com/andrew-morris/kippo_detect) - Offensive component that detects the presence of the kippo honeypot.
|
||||
|
||||
- ICS/SCADA honeypots
|
||||
|
||||
- [Conpot](https://github.com/mushorg/conpot) - ICS/SCADA honeypot.
|
||||
- [GasPot](https://github.com/sjhilt/GasPot) - Veeder Root Gaurdian AST, common in the oil and gas industry.
|
||||
- [SCADA honeynet](http://scadahoneynet.sourceforge.net) - Building Honeypots for Industrial Networks.
|
||||
- [gridpot](https://github.com/sk4ld/gridpot) - Open source tools for realistic-behaving electric grid honeynets.
|
||||
- [scada-honeynet](http://www.digitalbond.com/blog/2007/07/24/scada-honeynet-article-in-infragard-publication/) - Mimics many of the services from a popular PLC and better helps SCADA researchers understand potential risks of exposed control system devices.
|
||||
|
||||
- Other/random
|
||||
|
||||
- [CitrixHoneypot](https://github.com/MalwareTech/CitrixHoneypot) - Detect and log CVE-2019-19781 scan and exploitation attempts.
|
||||
- [Damn Simple Honeypot (DSHP)](https://github.com/naorlivne/dshp) - Honeypot framework with pluggable handlers.
|
||||
- [dicompot](https://github.com/nsmfoo/dicompot) - DICOM Honeypot.
|
||||
- [IPP Honey](https://gitlab.com/bontchev/ipphoney) - A honeypot for the Internet Printing Protocol.
|
||||
- [Log4Pot](https://github.com/thomaspatzke/Log4Pot) - A honeypot for the Log4Shell vulnerability (CVE-2021-44228).
|
||||
- [Masscanned](https://github.com/ivre/masscanned) - Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hosted alternative to GreyNoise.
|
||||
- [medpot](https://github.com/schmalle/medpot) - HL7 / FHIR honeypot.
|
||||
- [NOVA](https://github.com/DataSoft/Nova) - Uses honeypots as detectors, looks like a complete system.
|
||||
- [OpenFlow Honeypot (OFPot)](https://github.com/upa/ofpot) - Redirects traffic for unused IPs to a honeypot, built on POX.
|
||||
- [OpenCanary](https://github.com/thinkst/opencanary) - Modular and decentralised honeypot daemon that runs several canary versions of services that alerts when a service is (ab)used.
|
||||
- [ciscoasa_honeypot](https://github.com/cymmetria/ciscoasa_honeypot) A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.
|
||||
- [miniprint](https://github.com/sa7mon/miniprint) - A medium interaction printer honeypot.
|
||||
|
||||
- Botnet C2 tools
|
||||
|
||||
- [Hale](https://github.com/pjlantz/Hale) - Botnet command and control monitor.
|
||||
- [dnsMole](https://code.google.com/archive/p/dns-mole/) - Analyses DNS traffic and potentionaly detect botnet command and control server activity, along with infected hosts.
|
||||
|
||||
- IPv6 attack detection tool
|
||||
|
||||
- [ipv6-attack-detector](https://github.com/mzweilin/ipv6-attack-detector/) - Google Summer of Code 2012 project, supported by The Honeynet Project organization.
|
||||
|
||||
- Dynamic code instrumentation toolkit
|
||||
|
||||
- [Frida](https://www.frida.re) - Inject JavaScript to explore native apps on Windows, Mac, Linux, iOS and Android.
|
||||
|
||||
- Tool to convert website to server honeypots
|
||||
|
||||
- [HIHAT](http://hihat.sourceforge.net/) - Transform arbitrary PHP applications into web-based high-interaction Honeypots.
|
||||
|
||||
- Malware collector
|
||||
|
||||
- [Kippo-Malware](https://bruteforcelab.com/kippo-malware) - Python script that will download all malicious files stored as URLs in a Kippo SSH honeypot database.
|
||||
|
||||
- Distributed sensor deployment
|
||||
|
||||
- [Community Honey Network](https://communityhoneynetwork.readthedocs.io/en/stable/) - CHN aims to make deployments honeypots and honeypot management tools easy and flexible. The default deployment method uses Docker Compose and Docker to deploy with a few simple commands.
|
||||
- [Modern Honey Network](https://github.com/threatstream/mhn) - Multi-snort and honeypot sensor management, uses a network of VMs, small footprint SNORT installations, stealthy dionaeas, and a centralized server for management.
|
||||
|
||||
- Network Analysis Tool
|
||||
|
||||
- [Tracexploit](https://code.google.com/archive/p/tracexploit/) - Replay network packets.
|
||||
|
||||
- Log anonymizer
|
||||
|
||||
- [LogAnon](http://code.google.com/archive/p/loganon/) - Log anonymization library that helps having anonymous logs consistent between logs and network captures.
|
||||
|
||||
- Low interaction honeypot (router back door)
|
||||
|
||||
- [Honeypot-32764](https://github.com/knalli/honeypot-for-tcp-32764) - Honeypot for router backdoor (TCP 32764).
|
||||
- [WAPot](https://github.com/lcashdol/WAPot) - Honeypot that can be used to observe traffic directed at home routers.
|
||||
|
||||
- honeynet farm traffic redirector
|
||||
|
||||
- [Honeymole](https://web.archive.org/web/20100326040550/http://www.honeynet.org.pt:80/index.php/HoneyMole) - Deploy multiple sensors that redirect traffic to a centralized collection of honeypots.
|
||||
|
||||
- HTTPS Proxy
|
||||
|
||||
- [mitmproxy](https://mitmproxy.org/) - Allows traffic flows to be intercepted, inspected, modified, and replayed.
|
||||
|
||||
- System instrumentation
|
||||
|
||||
- [Sysdig](https://sysdig.com/opensource/) - Open source, system-level exploration allows one to capture system state and activity from a running GNU/Linux instance, then save, filter, and analyze the results.
|
||||
- [Fibratus](https://github.com/rabbitstack/fibratus) - Tool for exploration and tracing of the Windows kernel.
|
||||
|
||||
- Honeypot for USB-spreading malware
|
||||
|
||||
- [Ghost-usb](https://github.com/honeynet/ghost-usb-honeypot) - Honeypot for malware that propagates via USB storage devices.
|
||||
|
||||
- Data Collection
|
||||
|
||||
- [Kippo2MySQL](https://bruteforcelab.com/kippo2mysql) - Extracts some very basic stats from Kippo’s text-based log files and inserts them in a MySQL database.
|
||||
- [Kippo2ElasticSearch](https://bruteforcelab.com/kippo2elasticsearch) - Python script to transfer data from a Kippo SSH honeypot MySQL database to an ElasticSearch instance (server or cluster).
|
||||
|
||||
- Passive network audit framework parser
|
||||
|
||||
- [Passive Network Audit Framework (pnaf)](https://github.com/jusafing/pnaf) - Framework that combines multiple passive and automated analysis techniques in order to provide a security assessment of network platforms.
|
||||
|
||||
- VM monitoring and tools
|
||||
|
||||
- [Antivmdetect](https://github.com/nsmfoo/antivmdetection) - Script to create templates to use with VirtualBox to make VM detection harder.
|
||||
- [VMCloak](https://github.com/hatching/vmcloak) - Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.
|
||||
- [vmitools](http://libvmi.com/) - C library with Python bindings that makes it easy to monitor the low-level details of a running virtual machine.
|
||||
|
||||
- Binary debugger
|
||||
|
||||
- [Hexgolems - Pint Debugger Backend](https://github.com/hexgolems/pint) - Debugger backend and LUA wrapper for PIN.
|
||||
- [Hexgolems - Schem Debugger Frontend](https://github.com/hexgolems/schem) - Debugger frontend.
|
||||
|
||||
- Mobile Analysis Tool
|
||||
|
||||
- [Androguard](https://github.com/androguard/androguard) - Reverse engineering, Malware and goodware analysis of Android applications and more.
|
||||
- [APKinspector](https://github.com/honeynet/apkinspector/) - Powerful GUI tool for analysts to analyze the Android applications.
|
||||
|
||||
- Low interaction honeypot
|
||||
|
||||
- [Honeyperl](https://sourceforge.net/projects/honeyperl/) - Honeypot software based in Perl with plugins developed for many functions like : wingates, telnet, squid, smtp, etc.
|
||||
- [T-Pot](https://github.com/dtag-dev-sec/tpotce) - All in one honeypot appliance from telecom provider T-Mobile
|
||||
- [beelzebub](https://github.com/mariocandela/beelzebub) - A secure honeypot framework, extremely easy to configure by yaml 🚀
|
||||
|
||||
- Honeynet data fusion
|
||||
|
||||
- [HFlow2](https://projects.honeynet.org/hflow) - Data coalesing tool for honeynet/network analysis.
|
||||
|
||||
- Server
|
||||
|
||||
- [Amun](http://amunhoney.sourceforge.net) - Vulnerability emulation honeypot.
|
||||
- [Artillery](https://github.com/trustedsec/artillery/) - Open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.
|
||||
- [Bait and Switch](http://baitnswitch.sourceforge.net) - Redirects all hostile traffic to a honeypot that is partially mirroring your production system.
|
||||
- [Bifrozt](https://github.com/Ziemeck/bifrozt-ansible) - Automatic deploy bifrozt with ansible.
|
||||
- [Conpot](http://conpot.org/) - Low interactive server side Industrial Control Systems honeypot.
|
||||
- [Heralding](https://github.com/johnnykv/heralding) - Credentials catching honeypot.
|
||||
- [HoneyWRT](https://github.com/CanadianJeff/honeywrt) - Low interaction Python honeypot designed to mimic services or ports that might get targeted by attackers.
|
||||
- [Honeyd](https://github.com/provos/honeyd) - See [honeyd tools](#honeyd-tools).
|
||||
- [Honeysink](http://www.honeynet.org/node/773) - Open source network sinkhole that provides a mechanism for detection and prevention of malicious traffic on a given network.
|
||||
- [Hontel](https://github.com/stamparm/hontel) - Telnet Honeypot.
|
||||
- [KFSensor](http://www.keyfocus.net/kfsensor/) - Windows based honeypot Intrusion Detection System (IDS).
|
||||
- [LaBrea](http://labrea.sourceforge.net/labrea-info.html) - Takes over unused IP addresses, and creates virtual servers that are attractive to worms, hackers, and other denizens of the Internet.
|
||||
- [MTPot](https://github.com/Cymmetria/MTPot) - Open Source Telnet Honeypot, focused on Mirai malware.
|
||||
- [SIREN](https://github.com/blaverick62/SIREN) - Semi-Intelligent HoneyPot Network - HoneyNet Intelligent Virtual Environment.
|
||||
- [TelnetHoney](https://github.com/balte/TelnetHoney) - Simple telnet honeypot.
|
||||
- [UDPot Honeypot](https://github.com/jekil/UDPot) - Simple UDP/DNS honeypot scripts.
|
||||
- [Yet Another Fake Honeypot (YAFH)](https://github.com/fnzv/YAFH) - Simple honeypot written in Go.
|
||||
- [arctic-swallow](https://github.com/ajackal/arctic-swallow) - Low interaction honeypot.
|
||||
- [fapro](https://github.com/fofapro/fapro) - Fake Protocol Server.
|
||||
- [glutton](https://github.com/mushorg/glutton) - All eating honeypot.
|
||||
- [go-HoneyPot](https://github.com/Mojachieee/go-HoneyPot) - Honeypot server written in Go.
|
||||
- [go-emulators](https://github.com/kingtuna/go-emulators) - Honeypot Golang emulators.
|
||||
- [honeymail](https://github.com/sec51/honeymail) - SMTP honeypot written in Golang.
|
||||
- [honeytrap](https://github.com/tillmannw/honeytrap) - Low-interaction honeypot and network security tool written to catch attacks against TCP and UDP services.
|
||||
- [imap-honey](https://github.com/yvesago/imap-honey) - IMAP honeypot written in Golang.
|
||||
- [mwcollectd](https://www.openhub.net/p/mwcollectd) - Versatile malware collection daemon, uniting the best features of nepenthes and honeytrap.
|
||||
- [potd](https://github.com/lnslbrty/potd) - Highly scalable low- to medium-interaction SSH/TCP honeypot designed for OpenWrt/IoT devices leveraging several Linux kernel features, such as namespaces, seccomp and thread capabilities.
|
||||
- [portlurker](https://github.com/bartnv/portlurker) - Port listener in Rust with protocol guessing and safe string display.
|
||||
- [slipm-honeypot](https://github.com/rshipp/slipm-honeypot) - Simple low-interaction port monitoring honeypot.
|
||||
- [telnet-iot-honeypot](https://github.com/Phype/telnet-iot-honeypot) - Python telnet honeypot for catching botnet binaries.
|
||||
- [telnetlogger](https://github.com/robertdavidgraham/telnetlogger) - Telnet honeypot designed to track the Mirai botnet.
|
||||
- [vnclowpot](https://github.com/magisterquis/vnclowpot) - Low interaction VNC honeypot.
|
||||
|
||||
- IDS signature generation
|
||||
|
||||
- [Honeycomb](http://www.icir.org/christian/honeycomb/) - Automated signature creation using honeypots.
|
||||
|
||||
- Lookup service for AS-numbers and prefixes
|
||||
|
||||
- [CC2ASN](http://www.cc2asn.com/) - Simple lookup service for AS-numbers and prefixes belonging to any given country in the world.
|
||||
|
||||
- Data Collection / Data Sharing
|
||||
|
||||
- [HPfriends](http://hpfriends.honeycloud.net/#/home) - Honeypot data-sharing platform.
|
||||
- [hpfriends - real-time social data-sharing](https://heipei.io/sigint-hpfriends/) - Presentation about HPFriends feed system
|
||||
- [HPFeeds](https://github.com/rep/hpfeeds/) - Lightweight authenticated publish-subscribe protocol.
|
||||
|
||||
- Central management tool
|
||||
|
||||
- [PHARM](http://www.nepenthespharm.com/) - Manage, report, and analyze your distributed Nepenthes instances.
|
||||
|
||||
- Network connection analyzer
|
||||
|
||||
- [Impost](http://impost.sourceforge.net/) - Network security auditing tool designed to analyze the forensics behind compromised and/or vulnerable daemons.
|
||||
|
||||
- Honeypot deployment
|
||||
|
||||
- [honeyfs](https://github.com/referefref/honeyfs) - Tool to create artificial file systems for medium/high interaction honeypots.
|
||||
- [Modern Honeynet Network](http://threatstream.github.io/mhn/) - Streamlines deployment and management of secure honeypots.
|
||||
|
||||
- Honeypot extensions to Wireshark
|
||||
|
||||
- [Wireshark Extensions](https://www.honeynet.org/project/WiresharkExtensions) - Apply Snort IDS rules and signatures against packet capture files using Wireshark.
|
||||
|
||||
- Client
|
||||
|
||||
- [CWSandbox / GFI Sandbox](https://www.gfi.com/products-and-solutions/all-products)
|
||||
- [Capture-HPC-Linux](https://redmine.honeynet.org/projects/linux-capture-hpc/wiki)
|
||||
- [Capture-HPC-NG](https://github.com/CERT-Polska/HSN-Capture-HPC-NG)
|
||||
- [Capture-HPC](https://projects.honeynet.org/capture-hpc) - High interaction client honeypot (also called honeyclient).
|
||||
- [HoneyBOT](http://www.atomicsoftwaresolutions.com/)
|
||||
- [HoneyC](https://projects.honeynet.org/honeyc)
|
||||
- [HoneySpider Network](https://github.com/CERT-Polska/hsn2-bundle) - Highly-scalable system integrating multiple client honeypots to detect malicious websites.
|
||||
- [HoneyWeb](https://code.google.com/archive/p/gsoc-honeyweb/) - Web interface created to manage and remotely share Honeyclients resources.
|
||||
- [Jsunpack-n](https://github.com/urule99/jsunpack-n)
|
||||
- [MonkeySpider](http://monkeyspider.sourceforge.net)
|
||||
- [PhoneyC](https://github.com/honeynet/phoneyc) - Python honeyclient (later replaced by Thug).
|
||||
- [Pwnypot](https://github.com/shjalayeri/pwnypot) - High Interaction Client Honeypot.
|
||||
- [Rumal](https://github.com/thugs-rumal/) - Thug's Rumāl: a Thug's dress and weapon.
|
||||
- [Shelia](https://www.cs.vu.nl/~herbertb/misc/shelia/) - Client-side honeypot for attack detection.
|
||||
- [Thug](https://buffer.github.io/thug/) - Python-based low-interaction honeyclient.
|
||||
- [Thug Distributed Task Queuing](https://thug-distributed.readthedocs.io/en/latest/index.html)
|
||||
- [Trigona](https://www.honeynet.org/project/Trigona)
|
||||
- [URLQuery](https://urlquery.net/)
|
||||
- [YALIH (Yet Another Low Interaction Honeyclient)](https://github.com/Masood-M/yalih) - Low-interaction client honeypot designed to detect malicious websites through signature, anomaly, and pattern matching techniques.
|
||||
|
||||
- Honeypot
|
||||
|
||||
- [Deception Toolkit](http://www.all.net/dtk/dtk.html)
|
||||
- [IMHoneypot](https://github.com/mushorg/imhoneypot)
|
||||
|
||||
- PDF document inspector
|
||||
|
||||
- [peepdf](https://github.com/jesparza/peepdf) - Powerful Python tool to analyze PDF documents.
|
||||
|
||||
- Hybrid low/high interaction honeypot
|
||||
|
||||
- [HoneyBrid](http://honeybrid.sourceforge.net)
|
||||
|
||||
- SSH Honeypots
|
||||
|
||||
- [Blacknet](https://github.com/morian/blacknet) - Multi-head SSH honeypot system.
|
||||
- [Cowrie](https://github.com/cowrie/cowrie) - Cowrie SSH Honeypot (based on kippo).
|
||||
- [DShield docker](https://github.com/xme/dshield-docker) - Docker container running cowrie with DShield output enabled.
|
||||
- [endlessh](https://github.com/skeeto/endlessh) - SSH tarpit that slowly sends an endless banner. ([docker image](https://hub.docker.com/r/linuxserver/endlessh))
|
||||
- [HonSSH](https://github.com/tnich/honssh) - Logs all SSH communications between a client and server.
|
||||
- [HUDINX](https://github.com/Cryptix720/HUDINX) - Tiny interaction SSH honeypot engineered in Python to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.
|
||||
- [Kippo](https://github.com/desaster/kippo) - Medium interaction SSH honeypot.
|
||||
- [Kippo_JunOS](https://github.com/gregcmartin/Kippo_JunOS) - Kippo configured to be a backdoored netscreen.
|
||||
- [Kojoney2](https://github.com/madirish/kojoney2) - Low interaction SSH honeypot written in Python and based on Kojoney by Jose Antonio Coret.
|
||||
- [Kojoney](http://kojoney.sourceforge.net/) - Python-based Low interaction honeypot that emulates an SSH server implemented with Twisted Conch.
|
||||
- [Longitudinal Analysis of SSH Cowrie Honeypot Logs](https://github.com/deroux/longitudinal-analysis-cowrie) - Python based command line tool to analyze cowrie logs over time.
|
||||
- [LongTail Log Analysis @ Marist College](http://longtail.it.marist.edu/honey/) - Analyzed SSH honeypot logs.
|
||||
- [Malbait](https://github.com/batchmcnulty/Malbait) - Simple TCP/UDP honeypot implemented in Perl.
|
||||
- [MockSSH](https://github.com/ncouture/MockSSH) - Mock an SSH server and define all commands it supports (Python, Twisted).
|
||||
- [cowrie2neo](https://github.com/xlfe/cowrie2neo) - Parse cowrie honeypot logs into a neo4j database.
|
||||
- [go-sshoney](https://github.com/ashmckenzie/go-sshoney) - SSH Honeypot.
|
||||
- [go0r](https://github.com/fzerorubigd/go0r) - Simple ssh honeypot in Golang.
|
||||
- [gohoney](https://github.com/PaulMaddox/gohoney) - SSH honeypot written in Go.
|
||||
- [hived](https://github.com/sahilm/hived) - Golang-based honeypot.
|
||||
- [hnypots-agent)](https://github.com/joshrendek/hnypots-agent) - SSH Server in Go that logs username and password combinations.
|
||||
- [honeypot.go](https://github.com/mdp/honeypot.go) - SSH Honeypot written in Go.
|
||||
- [honeyssh](https://github.com/ppacher/honeyssh) - Credential dumping SSH honeypot with statistics.
|
||||
- [hornet](https://github.com/czardoz/hornet) - Medium interaction SSH honeypot that supports multiple virtual hosts.
|
||||
- [ssh-auth-logger](https://github.com/JustinAzoff/ssh-auth-logger) - Low/zero interaction SSH authentication logging honeypot.
|
||||
- [ssh-honeypot](https://github.com/droberson/ssh-honeypot) - Fake sshd that logs IP addresses, usernames, and passwords.
|
||||
- [ssh-honeypot](https://github.com/amv42/sshd-honeypot) - Modified version of the OpenSSH deamon that forwards commands to Cowrie where all commands are interpreted and returned.
|
||||
- [ssh-honeypotd](https://github.com/sjinks/ssh-honeypotd) - Low-interaction SSH honeypot written in C.
|
||||
- [sshForShits](https://github.com/traetox/sshForShits) - Framework for a high interaction SSH honeypot.
|
||||
- [sshesame](https://github.com/jaksi/sshesame) - Fake SSH server that lets everyone in and logs their activity.
|
||||
- [sshhipot](https://github.com/magisterquis/sshhipot) - High-interaction MitM SSH honeypot.
|
||||
- [sshlowpot](https://github.com/magisterquis/sshlowpot) - Yet another no-frills low-interaction SSH honeypot in Go.
|
||||
- [sshsyrup](https://github.com/mkishere/sshsyrup) - Simple SSH Honeypot with features to capture terminal activity and upload to asciinema.org.
|
||||
- [twisted-honeypots](https://github.com/lanjelot/twisted-honeypots) - SSH, FTP and Telnet honeypots based on Twisted.
|
||||
|
||||
- Distributed sensor project
|
||||
|
||||
- [DShield Web Honeypot Project](https://sites.google.com/site/webhoneypotsite/)
|
||||
|
||||
- A pcap analyzer
|
||||
|
||||
- [Honeysnap](https://projects.honeynet.org/honeysnap/)
|
||||
|
||||
- Network traffic redirector
|
||||
|
||||
- [Honeywall](https://projects.honeynet.org/honeywall/)
|
||||
|
||||
- Honeypot Distribution with mixed content
|
||||
|
||||
- [HoneyDrive](https://bruteforcelab.com/honeydrive)
|
||||
|
||||
- Honeypot sensor
|
||||
|
||||
- [Honeeepi](https://redmine.honeynet.org/projects/honeeepi/wiki) - Honeypot sensor on a Raspberry Pi based on a customized Raspbian OS.
|
||||
|
||||
- File carving
|
||||
|
||||
- [TestDisk & PhotoRec](https://www.cgsecurity.org/)
|
||||
|
||||
- Behavioral analysis tool for win32
|
||||
|
||||
- [Capture BAT](https://www.honeynet.org/node/315)
|
||||
|
||||
- Live CD
|
||||
|
||||
- [DAVIX](https://www.secviz.org/node/89) - The DAVIX Live CD.
|
||||
|
||||
- Spamtrap
|
||||
|
||||
- [Mail::SMTP::Honeypot](https://metacpan.org/pod/release/MIKER/Mail-SMTP-Honeypot-0.11/Honeypot.pm) - Perl module that appears to provide the functionality of a standard SMTP server.
|
||||
- [Mailoney](https://github.com/awhitehatter/mailoney) - SMTP honeypot, Open Relay, Cred Harvester written in python.
|
||||
- [SendMeSpamIDS.py](https://github.com/johestephan/VerySimpleHoneypot) - Simple SMTP fetch all IDS and analyzer.
|
||||
- [Shiva](https://github.com/shiva-spampot/shiva) - Spam Honeypot with Intelligent Virtual Analyzer.
|
||||
- [Shiva The Spam Honeypot Tips And Tricks For Getting It Up And Running](https://www.pentestpartners.com/security-blog/shiva-the-spam-honeypot-tips-and-tricks-for-getting-it-up-and-running/)
|
||||
- [SMTPLLMPot](https://github.com/referefref/SMTPLLMPot) - A super simple SMTP Honeypot built using GPT3.5
|
||||
- [SpamHAT](https://github.com/miguelraulb/spamhat) - Spam Honeypot Tool.
|
||||
- [Spamhole](http://www.spamhole.net/)
|
||||
- [honeypot](https://github.com/jadb/honeypot) - The Project Honey Pot un-official PHP SDK.
|
||||
- [spamd](http://man.openbsd.org/cgi-bin/man.cgi?query=spamd%26apropos=0%26sektion=0%26manpath=OpenBSD+Current%26arch=i386%26format=html)
|
||||
|
||||
- Commercial honeynet
|
||||
|
||||
- [Cymmetria Mazerunner](ttps://cymmetria.com/products/mazerunner/) - Leads attackers away from real targets and creates a footprint of the attack.
|
||||
|
||||
- Server (Bluetooth)
|
||||
|
||||
- [Bluepot](https://github.com/andrewmichaelsmith/bluepot)
|
||||
|
||||
- Dynamic analysis of Android apps
|
||||
|
||||
- [Droidbox](https://code.google.com/archive/p/droidbox/)
|
||||
|
||||
- Dockerized Low Interaction packaging
|
||||
|
||||
- [Docker honeynet](https://github.com/sreinhardt/Docker-Honeynet) - Several Honeynet tools set up for Docker containers.
|
||||
- [Dockerized Thug](https://hub.docker.com/r/honeynet/thug/) - Dockerized [Thug](https://github.com/buffer/thug) to analyze malicious web content.
|
||||
- [Dockerpot](https://github.com/mrschyte/dockerpot) - Docker based honeypot.
|
||||
- [Manuka](https://github.com/andrewmichaelsmith/manuka) - Docker based honeypot (Dionaea and Kippo).
|
||||
- [honey_ports](https://github.com/run41/honey_ports) - Very simple but effective docker deployed honeypot to detect port scanning in your environment.
|
||||
- [mhn-core-docker](https://github.com/MattCarothers/mhn-core-docker) - Core elements of the Modern Honey Network implemented in Docker.
|
||||
|
||||
- Network analysis
|
||||
|
||||
- [Quechua](https://bitbucket.org/zaccone/quechua)
|
||||
|
||||
- SIP Server
|
||||
|
||||
- [Artemnesia VoIP](http://artemisa.sourceforge.net)
|
||||
|
||||
- SIP
|
||||
|
||||
- [SentryPeer](https://github.com/SentryPeer/SentryPeer) - Protect your SIP Servers from bad actors.
|
||||
|
||||
- IOT Honeypot
|
||||
|
||||
- [HoneyThing](https://github.com/omererdem/honeything) - TR-069 Honeypot.
|
||||
- [Kako](https://github.com/darkarnium/kako) - Honeypots for a number of well known and deployed embedded device vulnerabilities.
|
||||
|
||||
- Honeytokens
|
||||
- [CanaryTokens](https://github.com/thinkst/canarytokens) - Self-hostable honeytoken generator and reporting dashboard; demo version available at [CanaryTokens.org](https://canarytokens.org/generate).
|
||||
- [Honeybits](https://github.com/0x4D31/honeybits) - Simple tool designed to enhance the effectiveness of your traps by spreading breadcrumbs and honeytokens across your production servers and workstations to lure the attacker toward your honeypots.
|
||||
- [Honeyλ (HoneyLambda)](https://github.com/0x4D31/honeylambda) - Simple, serverless application designed to create and monitor URL honeytokens, on top of AWS Lambda and Amazon API Gateway.
|
||||
- [dcept](https://github.com/secureworks/dcept) - Tool for deploying and detecting use of Active Directory honeytokens.
|
||||
- [honeyku](https://github.com/0x4D31/honeyku) - Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).
|
||||
|
||||
## Honeyd Tools
|
||||
|
||||
- Honeyd plugin
|
||||
|
||||
- [Honeycomb](http://www.honeyd.org/tools.php)
|
||||
|
||||
- Honeyd viewer
|
||||
|
||||
- [Honeyview](http://honeyview.sourceforge.net/)
|
||||
|
||||
- Honeyd to MySQL connector
|
||||
|
||||
- [Honeyd2MySQL](https://bruteforcelab.com/honeyd2mysql)
|
||||
|
||||
- A script to visualize statistics from honeyd
|
||||
|
||||
- [Honeyd-Viz](https://bruteforcelab.com/honeyd-viz)
|
||||
|
||||
- Honeyd stats
|
||||
- [Honeydsum.pl](https://github.com/DataSoft/Honeyd/blob/master/scripts/misc/honeydsum-v0.3/honeydsum.pl)
|
||||
|
||||
## Network and Artifact Analysis
|
||||
|
||||
- Sandbox
|
||||
|
||||
- [Argos](http://www.few.vu.nl/argos/) - Emulator for capturing zero-day attacks.
|
||||
- [COMODO automated sandbox](https://help.comodo.com/topic-72-1-451-4768-.html)
|
||||
- [Cuckoo](https://cuckoosandbox.org/) - Leading open source automated malware analysis system.
|
||||
- [Pylibemu](https://github.com/buffer/pylibemu) - Libemu Cython wrapper.
|
||||
- [RFISandbox](https://monkey.org/~jose/software/rfi-sandbox/) - PHP 5.x script sandbox built on top of [funcall](https://pecl.php.net/package/funcall).
|
||||
- [dorothy2](https://github.com/m4rco-/dorothy2) - Malware/botnet analysis framework written in Ruby.
|
||||
- [imalse](https://github.com/hbhzwj/imalse) - Integrated MALware Simulator and Emulator.
|
||||
- [libemu](https://github.com/buffer/libemu) - Shellcode emulation library, useful for shellcode detection.
|
||||
|
||||
- Sandbox-as-a-Service
|
||||
|
||||
- [Hybrid Analysis](https://www.hybrid-analysis.com) - Free malware analysis service powered by Payload Security that detects and analyzes unknown threats using a unique Hybrid Analysis technology.
|
||||
- [Joebox Cloud](https://jbxcloud.joesecurity.org/login) - Analyzes the behavior of malicious files including PEs, PDFs, DOCs, PPTs, XLSs, APKs, URLs and MachOs on Windows, Android and Mac OS X for suspicious activities.
|
||||
- [VirusTotal](https://www.virustotal.com/) - Analyze suspicious files and URLs to detect types of malware, and automatically share them with the security community.
|
||||
- [malwr.com](https://malwr.com/) - Free malware analysis service and community.
|
||||
|
||||
## Data Tools
|
||||
|
||||
- Front Ends
|
||||
|
||||
- [DionaeaFR](https://github.com/rubenespadas/DionaeaFR) - Front Web to Dionaea low-interaction honeypot.
|
||||
- [Django-kippo](https://github.com/jedie/django-kippo) - Django App for kippo SSH Honeypot.
|
||||
- [Shockpot-Frontend](https://github.com/GovCERT-CZ/Shockpot-Frontend) - Full featured script to visualize statistics from a Shockpot honeypot.
|
||||
- [Tango](https://github.com/aplura/Tango) - Honeypot Intelligence with Splunk.
|
||||
- [Wordpot-Frontend](https://github.com/GovCERT-CZ/Wordpot-Frontend) - Full featured script to visualize statistics from a Wordpot honeypot.
|
||||
- [honeyalarmg2](https://github.com/schmalle/honeyalarmg2) - Simplified UI for showing honeypot alarms.
|
||||
- [honeypotDisplay](https://github.com/Joss-Steward/honeypotDisplay) - Flask website which displays data gathered from an SSH Honeypot.
|
||||
|
||||
- Visualization
|
||||
|
||||
- [Acapulco](https://github.com/hgascon/acapulco) - Automated Attack Community Graph Construction.
|
||||
- [Afterglow Cloud](https://github.com/ayrus/afterglow-cloud)
|
||||
- [Afterglow](http://afterglow.sourceforge.net/)
|
||||
- [Glastopf Analytics](https://github.com/katkad/Glastopf-Analytics) - Easy honeypot statistics.
|
||||
- [HoneyMalt](https://github.com/SneakersInc/HoneyMalt) - Maltego tranforms for mapping Honeypot systems.
|
||||
- [HoneyMap](https://github.com/fw42/honeymap) - Real-time websocket stream of GPS events on a fancy SVG world map.
|
||||
- [HoneyStats](https://sourceforge.net/projects/honeystats/) - Statistical view of the recorded activity on a Honeynet.
|
||||
- [HpfeedsHoneyGraph](https://github.com/yuchincheng/HpfeedsHoneyGraph) - Visualization app to visualize hpfeeds logs.
|
||||
- [IVRE](https://github.com/ivre/ivre) - Network recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Criminalip / Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
|
||||
- [Kippo stats](https://github.com/mfontani/kippo-stats) - Mojolicious app to display statistics for your kippo SSH honeypot.
|
||||
- [Kippo-Graph](https://bruteforcelab.com/kippo-graph) - Full featured script to visualize statistics from a Kippo SSH honeypot.
|
||||
- [The Intelligent HoneyNet](https://github.com/jpyorre/IntelligentHoneyNet) - Create actionable information from honeypots.
|
||||
- [ovizart](https://github.com/oguzy/ovizart) - Visual analysis for network traffic.
|
||||
|
||||
## Guides
|
||||
|
||||
- [T-Pot: A Multi-Honeypot Platform](https://dtag-dev-sec.github.io/mediator/feature/2015/03/17/concept.html)
|
||||
- [Honeypot (Dionaea and kippo) setup script](https://github.com/andrewmichaelsmith/honeypot-setup-script/)
|
||||
|
||||
- Deployment
|
||||
|
||||
- [Dionaea and EC2 in 20 Minutes](http://andrewmichaelsmith.com/2012/03/dionaea-honeypot-on-ec2-in-20-minutes/) - Tutorial on setting up Dionaea on an EC2 instance.
|
||||
- [Using a Raspberry Pi honeypot to contribute data to DShield/ISC](https://isc.sans.edu/diary/22680) - The Raspberry Pi based system will allow us to maintain one code base that will make it easier to collect rich logs beyond firewall logs.
|
||||
- [honeypotpi](https://github.com/free5ty1e/honeypotpi) - Script for turning a Raspberry Pi into a HoneyPot Pi.
|
||||
|
||||
- Research Papers
|
||||
|
||||
- [Honeypot research papers](https://github.com/shbhmsingh72/Honeypot-Research-Papers) - PDFs of research papers on honeypots.
|
||||
- [vEYE](https://link.springer.com/article/10.1007%2Fs10115-008-0137-3) - Behavioral footprinting for self-propagating worm detection and profiling.
|
480
README_CN.md
Normal file
480
README_CN.md
Normal file
@ -0,0 +1,480 @@
|
||||
# 最优秀的蜜罐列表 [](https://github.com/sindresorhus/awesome)
|
||||
|
||||
优秀的蜜罐、组件等等相关的工具列表,分为 Web、服务等多个类别,重点放在开源项目上
|
||||
|
||||
每个类别中没有顺序,按照提交的先后顺序排列,如果您也想提交,请阅读 [指南](CONTRIBUTING.md).
|
||||
|
||||
探索更多优秀的列表请参阅:[sindresorhus/awesome](https://github.com/sindresorhus/awesome).
|
||||
|
||||
# 目录
|
||||
|
||||
- [最优秀的蜜罐列表 ](#最优秀的蜜罐列表-)
|
||||
- [目录](#目录)
|
||||
- [相关列表](#相关列表)
|
||||
- [蜜罐](#蜜罐)
|
||||
- [Honeyd工具](#honeyd工具)
|
||||
- [网络与行为分析](#网络与行为分析)
|
||||
- [数据分析工具](#数据分析工具)
|
||||
- [指南](#指南)
|
||||
|
||||
## 相关列表
|
||||
|
||||
- [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools) 网络流量分析
|
||||
- [awesome-malware-analysis](https://github.com/rshipp/awesome-malware-analysis) 与上表有些重复,更侧重恶意软件分析
|
||||
|
||||
## 蜜罐
|
||||
|
||||
- 数据库蜜罐
|
||||
- [Delilah](https://github.com/SecurityTW/delilah) - Python 编写的 Elasticsearch 蜜罐
|
||||
- [ESPot](https://github.com/mycert/ESPot) - 一个用 NodeJS 编写的 Elasticsearch 蜜罐,用于对 CVE-2014-3120 的利用
|
||||
- [ElasticPot](https://gitlab.com/bontchev/elasticpot) - Elasticsearch 蜜罐
|
||||
- [Elastic honey](https://github.com/jordan-wright/elastichoney) - 简单的 Elasticsearch 蜜罐
|
||||
- [MongoDB-HoneyProxy](https://github.com/Plazmaz/MongoDB-HoneyProxy) - MongoDB 蜜罐代理
|
||||
- [NoSQLpot](https://github.com/torque59/nosqlpot) - NoSQL 蜜罐框架
|
||||
- [mysql-honeypotd](https://github.com/sjinks/mysql-honeypotd) - C 编写的低交互 MySQL 蜜罐
|
||||
- [MysqlPot](https://github.com/schmalle/MysqlPot) - MySQL 蜜罐
|
||||
- [pghoney](https://github.com/betheroot/pghoney) - 低交互 Postgres 蜜罐
|
||||
- [sticky_elephant](https://github.com/betheroot/sticky_elephant) - 中交互 postgresql 蜜罐
|
||||
- [RedisHoneyPot](https://github.com/cypwnpwnsocute/RedisHoneyPot) - 高交互 Redis 蜜罐
|
||||
|
||||
- Web 蜜罐
|
||||
- [Express honeypot](https://github.com/christophe77/express-honeypot) - 使用 nodeJS 和 express 实现的 RFI & LFI 蜜罐
|
||||
- [EoHoneypotBundle](https://github.com/eymengunay/EoHoneypotBundle) - Symfony2 类型的蜜罐
|
||||
- [Glastopf](https://github.com/mushorg/glastopf) - Web 应用蜜罐
|
||||
- [Google Hack Honeypot](http://ghh.sourceforge.net) - 旨在提供针对那些使用搜索引擎探测资源的攻击者的侦察
|
||||
- [HellPot](https://github.com/yunginnanet/HellPot) - 试图让请求位置的 Bot 和客户端崩溃的蜜罐
|
||||
- [Laravel Application Honeypot](https://github.com/msurguy/Honeypot) - Honeypot - Laravel 应用程序的简单垃圾邮件预防软件包
|
||||
- [Nodepot](https://github.com/schmalle/Nodepot) - NodeJS Web 应用蜜罐
|
||||
- [PasitheaHoneypot](https://github.com/Marist-Innovation-Lab/PasitheaHoneypot) - RestAPI 蜜罐
|
||||
- [Servletpot](https://github.com/schmalle/servletpot) - Web 应用蜜罐
|
||||
- [Shadow Daemon](https://shadowd.zecure.org/overview/introduction/) - 用于 PHP、Perl 和 Python 应用程序的模块化Web应用程序防火墙/高交互式蜜罐
|
||||
- [StrutsHoneypot](https://github.com/Cymmetria/StrutsHoneypot) - 基于 Struts Apache 2 的蜜罐
|
||||
- [WebTrap](https://github.com/IllusiveNetworks-Labs/WebTrap) - 旨在创建欺骗性网页,重定向到真实网站
|
||||
- [basic-auth-pot (bap)](https://github.com/bjeborn/basic-auth-pot) bap - HTTP 基本认证蜜罐
|
||||
- [bwpot](https://github.com/graneed/bwpot) - Web 应用蜜罐
|
||||
- [django-admin-honeypot](https://github.com/dmpayton/django-admin-honeypot) - 虚假的 Django 管理登录页面,记录未经授权的访问尝试
|
||||
- [drupo](https://github.com/d1str0/drupot) - Drupal 蜜罐
|
||||
- [galah](https://github.com/0x4D31/galah) - 基于 OpneAI API 的大语言模型(LLM)驱动的蜜罐
|
||||
- [honeyhttpd](https://github.com/bocajspear1/honeyhttpd) - 基于 Python 的 Web 服务器蜜罐构建工具
|
||||
- [honeyup](https://github.com/LogoiLab/honeyup) - 模拟不安全网站的 Web 蜜罐
|
||||
- [modpot](https://github.com/referefref/modpot) - Modpot 是模块化的 Web 应用蜜罐框架,该框架基于 Golang 与 Gin 开发。
|
||||
- [owa-honeypot](https://github.com/joda32/owa-honeypot) - 基于 Flask 的 Outlook Web 蜜罐
|
||||
- [phpmyadmin_honeypot](https://github.com/gfoss/phpmyadmin_honeypot) - - 简单有效的 phpMyAdmin 蜜罐
|
||||
- [shockpot](https://github.com/threatstream/shockpot) - 检测 Shell Shock 利用尝试的 Web 应用蜜罐
|
||||
- [smart-honeypot](https://github.com/freak3dot/smart-honeypot) - PHP 脚本编写的智能蜜罐
|
||||
- Snare/Tanner - Glastopf 的后继者
|
||||
- [Snare](https://github.com/mushorg/snare) - 下一代高交互 honEypot
|
||||
- [Tanner](https://github.com/mushorg/tanner) - 评估 SNARE 事件
|
||||
- [stack-honeypot](https://github.com/CHH/stack-honeypot) - 将针对垃圾邮件机器人的陷阱插入到响应中
|
||||
- [tomcat-manager-honeypot](https://github.com/helospark/tomcat-manager-honeypot) - Tomcat 蜜罐。记录请求并保存攻击者的 WAR 文件
|
||||
- WordPress honeypots
|
||||
- [HonnyPotter](https://github.com/MartinIngesen/HonnyPotter) - WordPress 的登录蜜罐,用于收集和分析失败的登录尝试
|
||||
- [HoneyPress](https://github.com/kungfuguapo/HoneyPress) - Docker 容器中基于 Python 的 WordPress 蜜罐
|
||||
- [wp-smart-honeypot](https://github.com/freak3dot/wp-smart-honeypot) - 减少垃圾邮件的 WordPress 插件
|
||||
- [wordpot](https://github.com/gbrindisi/wordpot) - WordPress 蜜罐
|
||||
- [Python-Honeypot](https://github.com/OWASP/Python-Honeypot) - OWASP 蜜罐,自动化欺骗框架
|
||||
|
||||
- 服务蜜罐
|
||||
- [ADBHoney](https://github.com/huuck/ADBHoney) - 安卓低交互蜜罐
|
||||
- [AMTHoneypot](https://github.com/packetflare/amthoneypot) - 针对 Intel 的 AMT 固件漏洞(CVE-2017-5689)的蜜罐
|
||||
- [ddospot](https://github.com/aelth/ddospot) -反射放大 DDoS 蜜罐,支持 NTP、DNS、SSDP、Chargen 与其他 UDP 协议
|
||||
- [dionaea](https://github.com/DinoTools/dionaea) - dionaea 蜜罐的主页
|
||||
- [dhp](https://github.com/ciscocsirt/dhp) - 模拟 Docker HTTP API 的简单 Docker 蜜罐
|
||||
- [DolosHoneypot](https://github.com/Marist-Innovation-Lab/DolosHoneypot) - SDN 蜜罐
|
||||
- [Ensnare](https://github.com/ahoernecke/ensnare) - 易部署的 Ruby 蜜罐
|
||||
- [Helix](https://github.com/Zeerg/helix-honeypot) - 具备主动防御能力的 K8s API 蜜罐
|
||||
- [honeycomb_plugins](https://github.com/Cymmetria/honeycomb_plugins) - Cymmetria 蜜罐 Honeycomb 插件库
|
||||
- [honeydb] (https://honeydb.io/downloads) - 易于部署和配置的多服务蜜罐。用户可以将交互数据回传到 HoneyDB 后端汇集在一处,以便通过 REST API 进行访问
|
||||
- [honeyntp](https://github.com/fygrave/honeyntp) - NTP 蜜罐
|
||||
- [honeypot-camera](https://github.com/alexbredo/honeypot-camera) - 摄像机蜜罐
|
||||
- [honeypot-ftp](https://github.com/alexbredo/honeypot-ftp) - FTP 蜜罐
|
||||
- [honeypots](https://github.com/qeeqbox/honeypots) - 一个 pypi 包中有 25 种不同的蜜罐!(DNS、FTP、HTTPPROXY、HTTP、HTTPS、IMAP、MYSQL、POP3、postgres、redis、smb、smtp、socks5、ssh、telnet、vnc、mssql、elastic、ldap、ntp、memcache、snmp、oracle、sip 和 irc)
|
||||
- [honeytrap](https://github.com/honeytrap/honeytrap) - 用 Go 编写的高级蜜罐框架,可以与其他蜜罐软件连接
|
||||
- [HoneyPy](https://github.com/foospidy/HoneyPy) - 低交互蜜罐
|
||||
- [Honeygrove](https://github.com/UHH-ISS/honeygrove) - 基于 Twisted 的多用途、模块化蜜罐
|
||||
- [Honeyport](https://github.com/securitygeneration/Honeyport) - Bash 和 Python 写成的简单 honeyport
|
||||
- [Honeyprint](https://github.com/glaslos/honeyprint) - 打印机蜜罐
|
||||
- [Lyrebird](https://hub.docker.com/r/lyrebird/honeypot-base/) - 现代高交互蜜罐框架
|
||||
- [MICROS honeypot](https://github.com/Cymmetria/micros_honeypot) - 在带有 Oracle Hospitality Simphony 的 Oracle Hospitality Applications (MICROS) 中检测 CVE-2018-2636 的低交互蜜罐
|
||||
- [node-ftp-honeypot](https://github.com/christophe77/node-ftp-honeypot) - JavaScript 编写的 FTP 蜜罐
|
||||
- [pyrdp](https://github.com/gosecure/pyrdp) - Python 3 实现的 RDP 蜜罐
|
||||
- [rdppot](https://github.com/kryptoslogic/rdppot) - RDP 蜜罐
|
||||
- [RDPy](https://github.com/citronneur/rdpy) - Python 实现的 RDP 蜜罐
|
||||
- [SMB Honeypot](https://github.com/r0hi7/HoneySMB) - 可以捕获类似 Wannacry 的恶意软件的高交互 SMB 蜜罐
|
||||
- [Tom's Honeypot](https://github.com/inguardians/toms_honeypot) - 低交互 Python 蜜罐
|
||||
- [troje](https://github.com/dutchcoders/troje/) - 在独立的 LXC 容器中运行的蜜罐服务
|
||||
- [WebLogic honeypot](https://github.com/Cymmetria/weblogic_honeypot) - 在带有 Oracle WebLogic Server 的 Oracle Fusion Middleware 中检测 CVE-2017-10271 的低交互蜜罐
|
||||
- [WhiteFace Honeypot](https://github.com/csirtgadgets/csirtg-honeypot) - 基于 Twisted 开发的针对 WhiteFace 蜜罐
|
||||
|
||||
- 分布式蜜罐
|
||||
- [DemonHunter](https://github.com/RevengeComing/DemonHunter) - 低交互蜜罐服务器
|
||||
|
||||
- 反蜜罐
|
||||
- [canarytokendetector](https://github.com/referefref/canarytokendetector) - 用于检测 Thinkst CanaryTokens 的工具
|
||||
- [honeydet](https://github.com/referefref/honeydet) - Golang 编写的基于签名的蜜罐检测工具
|
||||
- [kippo_detect](https://github.com/andrew-morris/kippo_detect) - 检测 Kippo 蜜罐
|
||||
|
||||
- ICS/SCADA 蜜罐
|
||||
- [Conpot](https://github.com/mushorg/conpot) - ICS/SCADA 蜜罐
|
||||
- [GasPot](https://github.com/sjhilt/GasPot) - Veeder Root Gaurdian AST, 常见于石油、天然气行业
|
||||
- [SCADA honeynet](http://scadahoneynet.sourceforge.net) - 建立工业网络的蜜罐
|
||||
- [gridpot](https://github.com/sk4ld/gridpot) - 模拟实际电网的开源蜜罐
|
||||
- [scada-honeynet](http://www.digitalbond.com/blog/2007/07/24/scada-honeynet-article-in-infragard-publication/) - 模拟流行的 PLC 服务,更好地帮助 SCADA 研究人员了解暴露的控制系统设备的潜在风险
|
||||
|
||||
- 其他/随机
|
||||
- [CitrixHoneypot](https://github.com/MalwareTech/CitrixHoneypot) - 检测记录 CVE-2019-19781 扫描与漏洞利用
|
||||
- [Damn Simple Honeypot (DSHP)](https://github.com/naorlivne/dshp) - 带有插件化支持的简单蜜罐
|
||||
- [dicompot](https://github.com/nsmfoo/dicompot) - DICOM 蜜罐
|
||||
- [IPP Honey](https://gitlab.com/bontchev/ipphoney) - IPP 蜜罐
|
||||
- [Log4Pot](https://github.com/thomaspatzke/Log4Pot) - Log4Shell(CVE-2021-44228)蜜罐
|
||||
- [Masscanned](https://github.com/ivre/masscanned) - 专注于扫描与 Bot 的低交互蜜罐,能够与 IVRE 很好地集成在一起使用构建类似 GreyNoise 的替代方案
|
||||
- [medpot](https://github.com/schmalle/medpot) - HL7 / FHIR honeypot.
|
||||
- [NOVA](https://github.com/DataSoft/Nova) 看起来像完整系统的蜜罐
|
||||
- [OpenFlow Honeypot(OFPot)](https://github.com/upa/ofpot) - 基于 POX 的 OpenFlow 蜜罐,将未使用的IP地址的流量重定向到蜜罐中
|
||||
- [OpenCanary](https://pypi.org/project/opencanary/) - 模块化、分布式蜜罐
|
||||
- [ciscoasa_honeypot](https://github.com/cymmetria/ciscoasa_honeypot) 用于思科 ASA 低交互蜜罐,检测 CVE-2018-0101 远程代码执行漏洞
|
||||
- [miniprint](https://github.com/sa7mon/miniprint) - 打印机中交互蜜罐
|
||||
|
||||
- 僵尸网络 C&C 工具
|
||||
- [Hale](https://github.com/pjlantz/Hale) - 僵尸网络 C&C 监视器
|
||||
- [dnsMole](https://code.google.com/archive/p/dns-mole/) - 分析 DNS 流量,检测潜在的僵尸网络 C&C 服务器和受感染的主机
|
||||
|
||||
- IPv6 攻击检测工具
|
||||
- [ipv6-attack-detector](https://github.com/mzweilin/ipv6-attack-detector/) - Honeynet 项目支持的 Googel Summer of Code 2012 项目
|
||||
|
||||
- 动态代码检查工具包
|
||||
- [Frida](https://www.frida.re) - 注入 JavaScript 来探索Windows、Mac、Linux、iOS 和 Android 上的应用程序
|
||||
|
||||
- 将网站转换为服务器蜜罐
|
||||
- [HIHAT](http://hihat.sourceforge.net/) - 将任意 PHP 页面转换成基于 Web 的高交互蜜罐
|
||||
|
||||
- 恶意软件收集
|
||||
- [Kippo-Malware](https://bruteforcelab.com/kippo-malware) - 用于在 Kippo SSH 蜜罐数据库中记录的 URL 上下载恶恶意文件的 Python 脚本
|
||||
|
||||
- 分布式传感器部署
|
||||
- [Community Honey Network](https://communityhoneynetwork.readthedocs.io/en/stable/) - CHN 旨在使部署蜜罐和蜜罐管理变得简单灵活,默认使用 Docker Compose 和 Docker 进行部署
|
||||
- [Modern Honey Network](https://github.com/threatstream/mhn) - 分布式 Snort 与蜜罐传感器管理,使用虚拟网络,最小指纹的 SNORT 安装,服务器提供隐形侦察与集中管理
|
||||
|
||||
- 网络分析工具
|
||||
- [Tracexploit](https://code.google.com/archive/p/tracexploit/) - 重放网络数据包
|
||||
|
||||
- 日志匿名工具
|
||||
- [LogAnon](http://code.google.com/archive/p/loganon/) - 日志匿名库
|
||||
|
||||
- 低交互蜜罐(路由器后门)
|
||||
- [Honeypot-32764](https://github.com/knalli/honeypot-for-tcp-32764) - 路由器后门蜜罐(TCP 32764).
|
||||
- [WAPot](https://github.com/lcashdol/WAPot) - 能够观察家庭路由器流量的蜜罐
|
||||
|
||||
- 蜜罐流量重定向
|
||||
- [Honeymole](https://web.archive.org/web/20100326040550/http://www.honeynet.org.pt:80/index.php/HoneyMole) - 部署多个传感器回传流量到集中蜜罐中的工具
|
||||
|
||||
- HTTPS 代理
|
||||
- [mitmproxy](https://mitmproxy.org/) - 拦截、检查、修改、重放流量
|
||||
|
||||
- 系统插桩
|
||||
- [Sysdig](https://sysdig.com/opensource/) - 捕获 Linux 系统的状态与活动,可以进行保存、过滤与分析的开源系统级探索工具
|
||||
- [Fibratus](https://github.com/rabbitstack/fibratus) - 用于探索和跟踪 Windows 内核的工具
|
||||
|
||||
- 检测 USB 恶意传播的蜜罐
|
||||
- [Ghost-usb](https://github.com/honeynet/ghost-usb-honeypot) - 检测通过 USB 存储设备传播恶意软件的蜜罐
|
||||
|
||||
- 数据采集
|
||||
- [Kippo2MySQL](https://bruteforcelab.com/kippo2mysql) - 从 Kippo 的日志文件中提取一些基本的统计信息插入到数据库中
|
||||
- [Kippo2ElasticSearch](https://bruteforcelab.com/kippo2elasticsearch) - 用于将 Kippo SSH 蜜罐数据从 MySQL 数据库传输到 ElasticSearch 实例(服务器或集群)的 Python 脚本
|
||||
|
||||
- 被动网络审计框架解析工具
|
||||
- [Passive Network Audit Framework(pnaf)](https://github.com/jusafing/pnaf) - 被动网络审计框架
|
||||
|
||||
- 虚拟机监控工具
|
||||
- [Antivmdetect](https://github.com/nsmfoo/antivmdetection) - 用于创建 VirtualBox 虚拟机模版的脚本,使检测虚拟机更困难
|
||||
- [VMCloak](https://github.com/hatching/vmcloak) - Cuckoo 沙盒的自动虚拟机生成和隐藏
|
||||
- [vmitools](http://libvmi.com/) - 带有 Python 接口的 C 库,可以轻松监视运行中的虚拟机的底层细节
|
||||
|
||||
- 二进制调试器
|
||||
- [Hexgolems - Pint Debugger Backend](https://github.com/hexgolems/pint) - 一个调试器后端与 Pin 的 Lua 接口
|
||||
- [Hexgolems - Schem Debugger Frontend](https://github.com/hexgolems/schem) - 一个调试器前端
|
||||
|
||||
- 移动应用分析工具
|
||||
- [Androguard](https://github.com/androguard/androguard) - 安卓应用程序逆向工程工具
|
||||
- [APKinspector](https://github.com/honeynet/apkinspector/) - 带有界面的安卓应用程序分析工具
|
||||
|
||||
- 低交互蜜罐
|
||||
- [Honeyperl](https://sourceforge.net/projects/honeyperl/) - 基于 Perl 的蜜罐,有很多插件
|
||||
- [T-Pot](https://github.com/dtag-dev-sec/tpotce) - 为电信服务商 T-Mobile 提供的蜜罐
|
||||
- [beelzebub](https://github.com/mariocandela/beelzebub) - 蜜罐框架,支持通过 YAML 进行配置 🚀
|
||||
|
||||
- 蜜罐数据融合
|
||||
- [HFlow2](https://projects.honeynet.org/hflow) - 用于蜜罐/网络分析的数据融合工具
|
||||
|
||||
- 服务器
|
||||
- [Amun](http://amunhoney.sourceforge.net) - 漏洞模拟蜜罐
|
||||
- [Artillery](https://github.com/trustedsec/artillery/) - 开源蓝队工具,旨在通过多种办法保护 Linux 和 Windows 操作系统
|
||||
- [Bait and Switch](http://baitnswitch.sourceforge.net) - 将恶意流量重定向到生产系统镜像的蜜罐
|
||||
- [Bifrozt](https://github.com/Ziemeck/bifrozt-ansible) - 自动部署带有 ansible 的 bifrozt
|
||||
- [Conpot](http://conpot.org/) - 低交互的工业控制系统蜜罐
|
||||
- [Heralding](https://github.com/johnnykv/heralding) - 捕获凭据的蜜罐
|
||||
- [HoneyWRT](https://github.com/CanadianJeff/honeywrt) - 基于 Python 的低交互蜜罐,旨在模拟攻击者可能攻击的服务或端口
|
||||
- [Honeyd](https://github.com/provos/honeyd) 请查看[更多 honeyd 工具](#honeyd)
|
||||
- [Honeysink](http://www.honeynet.org/node/773) - 开源网络陷阱,提供了检测与阻止指定网络上恶意流量的机制
|
||||
- [Hontel](https://github.com/stamparm/hontel) - Telnet 蜜罐
|
||||
- [KFSensor](http://www.keyfocus.net/kfsensor/) - 基于 Windows 的入侵检测系统蜜罐
|
||||
- [LaBrea](http://labrea.sourceforge.net/labrea-info.html) - 接管未使用的 IP 地址,创建对蠕虫、黑客有吸引力的虚拟服务
|
||||
- [MTPot](https://github.com/Cymmetria/MTPot) - 专注于 Mirai 的开源 Telnet 蜜罐
|
||||
- [SIREN](https://github.com/blaverick62/SIREN) - 半智能蜜罐网络 - 蜜网只能虚拟环境
|
||||
- [TelnetHoney](https://github.com/balte/TelnetHoney) - 简单的 telnet 蜜罐
|
||||
- [UDPot Honeypot](https://github.com/jekil/UDPot) - 简单 UDP / DNS 蜜罐脚本
|
||||
- [Yet Another Fake Honeypot (YAFH)](https://github.com/fnzv/YAFH) - 使用 Go 编写的简单蜜罐
|
||||
- [arctic-swallow](https://github.com/ajackal/arctic-swallow) - 低交互蜜罐
|
||||
- [fapro](https://github.com/fofapro/fapro) - 虚假协议服务器
|
||||
- [glutton](https://github.com/mushorg/glutton) - 可喂食蜜罐
|
||||
- [go-HoneyPot](https://github.com/Mojachieee/go-HoneyPot) - 使用 Go 编写的蜜罐
|
||||
- [go-emulators](https://github.com/kingtuna/go-emulators) - Go 蜜罐模拟器
|
||||
- [honeymail](https://github.com/sec51/honeymail) - 使用 Go 编写的 SMTP 蜜罐
|
||||
- [honeytrap](https://github.com/tillmannw/honeytrap) - 一个用于捕获针对 TCP 和 UDP 服务攻击的低交互蜜罐
|
||||
- [imap-honey](https://github.com/yvesago/imap-honey) - 使用 Go 编写的 IMAP 蜜罐
|
||||
- [mwcollectd](https://www.openhub.net/p/mwcollectd) - 联合 nepenthes 和 honeytrap 的最佳功能实现的多功能恶意软件收集蜜罐
|
||||
- [potd](https://github.com/lnslbrty/potd) - 使用 Linux 的 Namespaces、Seccomp 与 Capabilities 构建针对 OpenWrt/IoT 设备的低中交互 SSH/TCP 蜜罐
|
||||
- [portlurker](https://github.com/bartnv/portlurker) - 用于协议猜测和安全字符显示的端口监听工具/蜜罐
|
||||
- [slipm-honeypot](https://github.com/rshipp/slipm-honeypot) - 简单的低交互端口监听蜜罐
|
||||
- [telnet-iot-honeypot](https://github.com/Phype/telnet-iot-honeypot) - 为了捕获僵尸网络二进制文件,使用 Python 编写的 telnet 蜜罐
|
||||
- [telnetlogger](https://github.com/robertdavidgraham/telnetlogger) - 跟踪 Mirai 的 Telnet 蜜罐
|
||||
- [vnclowpot](https://github.com/magisterquis/vnclowpot) - 低交互的 VNC 蜜罐
|
||||
|
||||
- IDS 签名生成
|
||||
- [Honeycomb](http://www.icir.org/christian/honeycomb/) - 使用蜜罐自动创建签名
|
||||
|
||||
- 查找服务提供商的 ASN 与前缀
|
||||
- [CC2ASN](http://www.cc2asn.com/) - 属于世界上任何给定国家的 AS 编号和前缀的查询服务
|
||||
|
||||
- 数据收集/数据共享
|
||||
- [HPfriends](http://hpfriends.honeycloud.net/#/home) - 蜜罐数据共享平台
|
||||
- [hpfriends](https://heipei.io/sigint-hpfriends/) - 关于 HPFriends feed 系统的介绍
|
||||
- [HPFeeds](https://github.com/rep/hpfeeds/) - 轻量认证的订阅发布协议
|
||||
|
||||
- 集中管理工具
|
||||
- [PHARM](http://www.nepenthespharm.com/) - 管理、统计、分析你的分布式 Nepenthes 蜜罐
|
||||
|
||||
- 网络连接分析工具
|
||||
- [Impost](http://impost.sourceforge.net/) - 网络安全审计工具,用于取证分析被破坏/易受攻击的守护进程
|
||||
|
||||
- 蜜罐部署
|
||||
- [honeyfs](https://github.com/referefref/honeyfs) - 为中/高交互蜜罐创建文件系统的工具
|
||||
- [Modern Honeynet Network](http://threatstream.github.io/mhn/) - 让蜜罐的管理与部署更简单
|
||||
|
||||
- Wireshark 的蜜罐扩展
|
||||
- [Wireshark Extensions](https://www.honeynet.org/project/WiresharkExtensions) - 支持应用针对 PCAP 文件的 Snort IDS 规则与签名
|
||||
|
||||
- 客户端蜜罐
|
||||
- [CWSandbox / GFI Sandbox](https://www.gfi.com/products-and-solutions/all-products)
|
||||
- [Capture-HPC-Linux](https://redmine.honeynet.org/projects/linux-capture-hpc/wiki)
|
||||
- [Capture-HPC-NG](https://github.com/CERT-Polska/HSN-Capture-HPC-NG)
|
||||
- [Capture-HPC](https://projects.honeynet.org/capture-hpc) - 高交互客户端蜜罐
|
||||
- [HoneyBOT](http://www.atomicsoftwaresolutions.com/)
|
||||
- [HoneyC](https://projects.honeynet.org/honeyc)
|
||||
- [HoneySpider Network](https://github.com/CERT-Polska/hsn2-bundle) - 集成多个客户端蜜罐检测恶意网站的可扩展系统
|
||||
- [HoneyWeb](https://code.google.com/archive/p/gsoc-honeyweb/) - 为管理与远程共享 Honeyclients 资源而创建的 Web 界面
|
||||
- [Jsunpack-n](https://github.com/urule99/jsunpack-n)
|
||||
- [MonkeySpider](http://monkeyspider.sourceforge.net)
|
||||
- [PhoneyC](https://github.com/honeynet/phoneyc)
|
||||
- [Pwnypot](https://github.com/shjalayeri/pwnypot) - 高交互客户端蜜罐
|
||||
- [Rumal](https://github.com/thugs-rumal/)
|
||||
- [Shelia](https://www.cs.vu.nl/~herbertb/misc/shelia/)
|
||||
- [Thug](https://buffer.github.io/thug/)
|
||||
- [Thug Distributed Task Queuing](https://thug-distributed.readthedocs.io/en/latest/index.html)
|
||||
- [Trigona](https://www.honeynet.org/project/Trigona)
|
||||
- [URLQuery](https://urlquery.net/)
|
||||
- [YALIH (Yet Another Low Interaction Honeyclient)](https://github.com/Masood-M/yalih) - 低交互客户端蜜罐,旨在通过签名,异常和模式匹配技术检测恶意网站
|
||||
|
||||
- 蜜罐
|
||||
- [Deception Toolkit](http://www.all.net/dtk/dtk.html)
|
||||
- [IMHoneypot](https://github.com/mushorg/imhoneypot)
|
||||
|
||||
- PDF 文档检查工具
|
||||
- [peepdf](https://github.com/jesparza/peepdf)
|
||||
|
||||
- 混合低/高交互蜜罐
|
||||
- [HoneyBrid](http://honeybrid.sourceforge.net)
|
||||
|
||||
- SSH 蜜罐
|
||||
- [Blacknet](https://github.com/morian/blacknet) - SSH 蜜罐系统
|
||||
- [Cowrie](https://github.com/cowrie/cowrie) - Cowrie SSH 蜜罐 (基于 kippo)
|
||||
- [DShield docker](https://github.com/xme/dshield-docker) - 启用了 DShield 输出的 Docker 容器
|
||||
- [endlessh](https://github.com/skeeto/endlessh) - SSH 蜜罐,支持([docker](https://hub.docker.com/r/linuxserver/endlessh))镜像
|
||||
- [HonSSH](https://github.com/tnich/honssh) - 记录客户端与服务器之间所有 SSH 通信
|
||||
- [HUDINX](https://github.com/Cryptix720/HUDINX) - 用于记录暴力破解的低交互 SSH 蜜罐,记录攻击者全部 Shell 交互
|
||||
- [Kippo](https://github.com/desaster/kippo) - 中交互 SSH 蜜罐
|
||||
- [Kippo_JunOS](https://github.com/gregcmartin/Kippo_JunOS) - 基于 Kippo 的蜜罐
|
||||
- [Kojoney2](https://github.com/madirish/kojoney2) - Jose Antonio Coret 使用 Python 编写,基于 Kojoney 的低交互 SSH 蜜罐
|
||||
- [Kojoney](http://kojoney.sourceforge.net/) - 基于 Python 的低交互蜜罐,使用 Twisted Conch 模拟 SSH 服务
|
||||
- [Longitudinal Analysis of SSH Cowrie Honeypot Logs](https://github.com/deroux/longitudinal-analysis-cowrie) - 基于 Python 的命令行工具,用于分析一段时间内的 cowrie 日志
|
||||
- [LongTail Log Analysis @ Marist College](http://longtail.it.marist.edu/honey/) - 分析 SSH 蜜罐日志
|
||||
- [Malbait](https://github.com/batchmcnulty/Malbait) - 使用 Perl 实现的 TCP/UDP 蜜罐
|
||||
- [MockSSH](https://github.com/ncouture/MockSSH) - 支持定义的所有命令的 SSH 服务器
|
||||
- [cowrie2neo](https://github.com/xlfe/cowrie2neo) - 解析 cowrie 蜜罐日志到 neo4j 数据库
|
||||
- [go-sshoney](https://github.com/ashmckenzie/go-sshoney) - SSH 蜜罐
|
||||
- [go0r](https://github.com/fzerorubigd/go0r) - 使用 Go 编写的简单 SSH 蜜罐
|
||||
- [gohoney](https://github.com/PaulMaddox/gohoney) - 使用 Go 编写的 SSH 蜜罐
|
||||
- [hived](https://github.com/sahilm/hived) - 基于 Go 编写的蜜罐
|
||||
- [hnypots-agent)](https://github.com/joshrendek/hnypots-agent) - 记录用户名和密码组合的 SSH 服务器
|
||||
- [honeypot.go](https://github.com/mdp/honeypot.go) - 使用 Go 编写的 SSH 蜜罐
|
||||
- [honeyssh](https://github.com/ppacher/honeyssh) - 凭据 dumping 的 SSH 蜜罐
|
||||
- [hornet](https://github.com/czardoz/hornet) - 支持多虚拟主机的中交互 SSH 蜜罐
|
||||
- [ssh-auth-logger](https://github.com/JustinAzoff/ssh-auth-logger) - 低\零交互 SSH 蜜罐
|
||||
- [ssh-honeypot](https://github.com/droberson/ssh-honeypot) - 伪造 SSHD,记录 IP 地址、用户名与密码
|
||||
- [ssh-honeypot](https://github.com/amv42/sshd-honeypot) - OpenSSH DEAMON 的改版,将命令转发到 Cowrie
|
||||
- [ssh-honeypotd](https://github.com/sjinks/ssh-honeypotd) - C 编写的低交互 SSH 蜜罐
|
||||
- [sshForShits](https://github.com/traetox/sshForShits) - 高交互 SSH 蜜罐框架
|
||||
- [sshesame](https://github.com/jaksi/sshesame) - 记录登录活动的虚假 SSH 服务器
|
||||
- [sshhipot](https://github.com/magisterquis/sshhipot) - 高交互中间人 SSH 蜜罐
|
||||
- [sshlowpot](https://github.com/magisterquis/sshlowpot) - Go 编写的低交互 SSH 蜜罐
|
||||
- [sshsyrup](https://github.com/mkishere/sshsyrup) - 简单的 SSH 蜜罐,捕获终端活动并上传到 asciinema.org
|
||||
- [twisted-honeypots](https://github.com/lanjelot/twisted-honeypots) - 基于 Twisted 的 SSH\FTP\Telnet 的蜜罐
|
||||
|
||||
- 分布式传感器项目
|
||||
- [DShield Web Honeypot Project](https://sites.google.com/site/webhoneypotsite/)
|
||||
|
||||
- PCAP 分析工具
|
||||
- [Honeysnap](https://projects.honeynet.org/honeysnap/)
|
||||
|
||||
- 网络流量重定向工具
|
||||
- [Honeywall](https://projects.honeynet.org/honeywall/)
|
||||
|
||||
- 混合内容的分布式蜜罐
|
||||
- [HoneyDrive](https://bruteforcelab.com/honeydrive)
|
||||
|
||||
- 蜜罐传感器
|
||||
- [Honeeepi](https://redmine.honeynet.org/projects/honeeepi/wiki) - Raspberry Pi 上一款基于定制 Raspbian 操作系统的蜜罐
|
||||
|
||||
- File carving
|
||||
- [TestDisk & PhotoRec](https://www.cgsecurity.org/)
|
||||
|
||||
- Windows 可用的行为分析工具
|
||||
- [Capture BAT](https://www.honeynet.org/node/315)
|
||||
|
||||
- Live CD
|
||||
- [DAVIX](https://www.secviz.org/node/89) - DAVIX Released
|
||||
|
||||
- Spamtrap
|
||||
- [Mail::SMTP::Honeypot](https://metacpan.org/pod/release/MIKER/Mail-SMTP-Honeypot-0.11/Honeypot.pm) - 提供标准 SMTP 服务器工具的 Perl 模块
|
||||
- [Mailoney](https://github.com/awhitehatter/mailoney) - Python 编写的 SMTP 蜜罐,具有开放中继、凭据记录等功能
|
||||
- [SendMeSpamIDS.py](https://github.com/johestephan/VerySimpleHoneypot) - 获得所有 IDS 和分析设备的简单 SMTP
|
||||
- [Shiva](https://github.com/shiva-spampot/shiva) - 垃圾邮件蜜罐与智能分析工具
|
||||
- [Shiva The Spam Honeypot Tips And Tricks For Getting It Up And Running](https://www.pentestpartners.com/security-blog/shiva-the-spam-honeypot-tips-and-tricks-for-getting-it-up-and-running/)
|
||||
- [SMTPLLMPot](https://github.com/referefref/SMTPLLMPot) - 使用 GPT 3.5 的简单 SMTP 蜜罐
|
||||
- [SpamHAT](https://github.com/miguelraulb/spamhat) - 垃圾邮件蜜罐工具
|
||||
- [Spamhole](http://www.spamhole.net/)
|
||||
- [honeypot](https://github.com/jadb/honeypot) - 蜜罐项目组非官方 PHP 的 SDK
|
||||
- [spamd](http://man.openbsd.org/cgi-bin/man.cgi?query=spamd%26apropos=0%26sektion=0%26manpath=OpenBSD+Current%26arch=i386%26format=html)
|
||||
|
||||
- 商业蜜网
|
||||
- [Cymmetria Mazerunner](https://cymmetria.com/products/mazerunner/) - 可引导攻击者远离真实目标,并创建攻击痕迹跟踪
|
||||
|
||||
- 服务器(蓝牙)
|
||||
- [Bluepot](https://github.com/andrewmichaelsmith/bluepot)
|
||||
|
||||
- Android 应用程序动态分析
|
||||
- [Droidbox](https://code.google.com/archive/p/droidbox/)
|
||||
|
||||
- Docker 化的低交互蜜罐
|
||||
- [Docker honeynet](https://github.com/sreinhardt/Docker-Honeynet) - 部署与 Docker 容器中的一些蜜网工具
|
||||
- [Dockerized Thug](https://hub.docker.com/r/honeynet/thug/) - 基于 [Thug](https://github.com/buffer/thug) 的 Docker 蜜罐,用于分析恶意 Web 内容
|
||||
- [Dockerpot](https://github.com/mrschyte/dockerpot) - 基于 Docker 的蜜罐
|
||||
- [Manuka](https://github.com/andrewmichaelsmith/manuka) - 基于 Docker 的蜜罐 (Dionaea & Kippo)
|
||||
- [honey_ports](https://github.com/run41/honey_ports) - 利用 Docker 进行蜜罐的部署发现端口扫描简单有效的办法
|
||||
- [mhn-core-docker](https://github.com/MattCarothers/mhn-core-docker) - 在 Docker 中实现的现代蜜网核心元素
|
||||
|
||||
- 网络分析
|
||||
- [Quechua](https://bitbucket.org/zaccone/quechua)
|
||||
|
||||
- SIP Server
|
||||
- [Artemnesia VoIP](http://artemisa.sourceforge.net)
|
||||
|
||||
- SIP
|
||||
- [SentryPeer](https://github.com/SentryPeer/SentryPeer) - 保护 SIP 服务器免于攻击
|
||||
|
||||
- IOT 蜜罐
|
||||
- [HoneyThing](https://github.com/omererdem/honeything) - TR-069 蜜罐
|
||||
- [Kako](https://github.com/darkarnium/kako) - 常见嵌入式设备漏洞的蜜罐
|
||||
|
||||
- Honeytokens
|
||||
- [CanaryTokens](https://github.com/thinkst/canarytokens) - Honeytoken 生成器,Dashboard 在 [CanaryTokens.org](https://canarytokens.org/generate)
|
||||
- [Honeybits](https://github.com/0x4D31/honeybits) - 旨在通过在生产服务器和工作站中传播 breadcrumbs 和 honeytokens 来诱使攻击者进入蜜罐,从而提高诱捕率
|
||||
- [Honeyλ (HoneyLambda)](https://github.com/0x4D31/honeylambda) - 简单的无服务器应用程序,旨在创建和监控 AWS Lambda 和 Amazon API Gateway 之上的网址 honeytokens
|
||||
- [dcept](https://github.com/secureworks/dcept) - 部署、检测活动目录使用情况的 honeytokens
|
||||
- [honeyku](https://github.com/0x4D31/honeyku) - 基于 Heroku 的 Web 蜜罐
|
||||
|
||||
## Honeyd工具
|
||||
|
||||
- Honeyd 插件
|
||||
- [Honeycomb](http://www.honeyd.org/tools.php)
|
||||
|
||||
- Honeyd 查看工具
|
||||
- [Honeyview](http://honeyview.sourceforge.net/)
|
||||
|
||||
- Honeyd 与 MySQL 的连接
|
||||
- [Honeyd2MySQL](https://bruteforcelab.com/honeyd2mysql)
|
||||
|
||||
- Honeyd 统计数据可视化脚本
|
||||
- [Honeyd-Viz](https://bruteforcelab.com/honeyd-viz)
|
||||
|
||||
- Honeyd 统计
|
||||
- [Honeydsum.pl](https://github.com/DataSoft/Honeyd/blob/master/scripts/misc/honeydsum-v0.3/honeydsum.pl)
|
||||
|
||||
|
||||
## 网络与行为分析
|
||||
|
||||
- 沙盒
|
||||
- [Argos](http://www.few.vu.nl/argos/) - 用于捕获零日攻击的模拟器
|
||||
- [COMODO automated sandbox](https://help.comodo.com/topic-72-1-451-4768-.html)
|
||||
- [Cuckoo](https://cuckoosandbox.org/) - 领先的开源自动化恶意软件分析系统
|
||||
- [Pylibemu](https://github.com/buffer/pylibemu) - Libemu Cython
|
||||
- [RFISandbox](https://monkey.org/~jose/software/rfi-sandbox/) - 使用 PHP 5.x 脚本在 [funcall](https://pecl.php.net/package/funcall) 上构建的沙盒
|
||||
- [dorothy2](https://github.com/m4rco-/dorothy2) - Ruby 编写的恶意软件/僵尸网络分析框架
|
||||
- [imalse](https://github.com/hbhzwj/imalse) - 集成的恶意软件仿真工具与模拟工具
|
||||
- [libemu](https://github.com/buffer/libemu) - Shellcode 模拟库,对 Shellcode 检测十分有用
|
||||
|
||||
- 沙盒即服务
|
||||
- [Hybrid Analysis](https://www.hybrid-analysis.com) - 由 Payload Security 提供的免费恶意软件分析服务,可使用其独特的混合分析技术检测和分析未知威胁
|
||||
- [Joebox Cloud](https://jbxcloud.joesecurity.org/login) - 确定 Windows、Android 和 Mac OS X 上的恶意文件(包括 PE、PDF、DOC、PPT、XLS、APK、URL 和 MachO)的行为,判断其是否存在可疑活动
|
||||
- [VirusTotal](https://www.virustotal.com/)
|
||||
- [malwr.com](https://malwr.com/) - 提供免费恶意软件分析服务与社区
|
||||
|
||||
## 数据分析工具
|
||||
|
||||
- 前端
|
||||
- [DionaeaFR](https://github.com/rubenespadas/DionaeaFR) - Dionaea 蜜罐前端 Web
|
||||
- [Django-kippo](https://github.com/jedie/django-kippo) - 用于 kippo SSH 蜜罐的 Django 程序
|
||||
- [Shockpot-Frontend](https://github.com/GovCERT-CZ/Shockpot-Frontend) - 用于可视化 Shockpot 蜜罐中数据的脚本
|
||||
- [Tango](https://github.com/aplura/Tango) - 使用 Splunk 处理蜜罐情报
|
||||
- [Wordpot-Frontend](https://github.com/GovCERT-CZ/Wordpot-Frontend) - 用于可视化 Wordpot 蜜罐中数据的脚本
|
||||
- [honeyalarmg2](https://github.com/schmalle/honeyalarmg2) - 用于显示蜜罐数据的简化 UI
|
||||
- [honeypotDisplay](https://github.com/Joss-Steward/honeypotDisplay) - 展示 SSH 蜜罐的 Flask 网站
|
||||
|
||||
- 可视化
|
||||
- [Acapulco](https://github.com/hgascon/acapulco) - 自动攻击群体图构建
|
||||
- [Afterglow Cloud](https://github.com/ayrus/afterglow-cloud)
|
||||
- [Afterglow](http://afterglow.sourceforge.net/)
|
||||
- [Glastopf Analytics](https://github.com/katkad/Glastopf-Analytics) - 简单蜜罐统计
|
||||
- [HoneyMalt](https://github.com/SneakersInc/HoneyMalt) - Maltego 转换映射蜜罐系统
|
||||
- [HoneyMap](https://github.com/fw42/honeymap) - 显示实时 Websocket 流的 SVG 地图
|
||||
- [HoneyStats](https://sourceforge.net/projects/honeystats/) - Honeynet 的统计视图
|
||||
- [HpfeedsHoneyGraph](https://github.com/yuchincheng/HpfeedsHoneyGraph) - 可视化 hpfeeds 日志的程序
|
||||
- [IVRE](https://github.com/ivre/ivre) - 由 @cea-sec 和 @ANSSI-FR 开发的网络侦察框架,作为 Criminalip/Shodan/ZoomEye/Censys 和 GreyNoise 的替代方案,收集各种情报
|
||||
- [Kippo stats](https://github.com/mfontani/kippo-stats) - 为 kippo SSH 蜜罐展示数据的程序
|
||||
- [Kippo-Graph](https://bruteforcelab.com/kippo-graph) - 用于可视化 Kippo 蜜罐中数据的脚本
|
||||
- [The Intelligent HoneyNet](https://github.com/jpyorre/IntelligentHoneyNet) - 试图创建蜜罐中可操作信息的智能蜜网项目
|
||||
- [ovizart](https://github.com/oguzy/ovizart) - 可视化网络流量分析
|
||||
|
||||
## 指南
|
||||
|
||||
- [T-Pot: 多蜜罐平台](https://dtag-dev-sec.github.io/mediator/feature/2015/03/17/concept.html)
|
||||
- [蜜罐 (Dionaea and kippo) 设置脚本](https://github.com/andrewmichaelsmith/honeypot-setup-script/)
|
||||
|
||||
- 部署
|
||||
- [Dionaea and EC2 in 20 Minutes](http://andrewmichaelsmith.com/2012/03/dionaea-honeypot-on-ec2-in-20-minutes/) - 在 EC2 上设置 Dionaea 的教程
|
||||
- [Using a Raspberry Pi honeypot to contribute data to DShield/ISC](https://isc.sans.edu/diary/22680) - 基于 Raspberry Pi 的系统可以收集比防火墙日志更丰富的日志
|
||||
- [honeypotpi](https://github.com/free5ty1e/honeypotpi) - 将 Raspberry Pi 变成 HoneyPot Pi 的脚本
|
||||
|
||||
- 研究论文
|
||||
- [Honeypot research papers](https://github.com/shbhmsingh72/Honeypot-Research-Papers) - 研究蜜罐论文的 PDF
|
||||
- [vEYE](https://link.springer.com/article/10.1007%2Fs10115-008-0137-3) - 自传播蠕虫行为痕迹的检测与分析
|
19
awesome-check.py
Executable file
19
awesome-check.py
Executable file
@ -0,0 +1,19 @@
|
||||
#!/usr/bin/env python
|
||||
|
||||
import re
|
||||
import sys
|
||||
import urllib2
|
||||
|
||||
with open(sys.argv[1], 'r') as f:
|
||||
for line in f.readlines():
|
||||
if '](http' in line:
|
||||
for url in re.findall("(http[s?]://[^)]+)", line):
|
||||
# print url
|
||||
try:
|
||||
request = urllib2.Request(url)
|
||||
request.get_method = lambda : 'HEAD'
|
||||
resp = urllib2.urlopen(request)
|
||||
if resp.getcode() != 200:
|
||||
print 'ERROR - ', line
|
||||
except urllib2.URLError, e:
|
||||
print e, line
|
Loading…
Reference in New Issue
Block a user