🤬
  • ■ ■ ■ ■ ■ ■
    README.md
    skipped 115 lines
    116 116  - Other/random
    117 117   
    118 118   - [Damn Simple Honeypot (DSHP)](https://github.com/naorlivne/dshp) - Honeypot framework with pluggable handlers.
    119  - - [Masscanned](https://github.com/ivre/masscanned) - a network responder. Its purpose is to provide generic answers to as many protocols as possible, and with as few assumptions as possible on the client's intentions, to interact with scanners and opportunistic bots as far as possible.
     119 + - [Masscanned](https://github.com/ivre/masscanned) - Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hosted alternative to GreyNoise.
    120 120   - [NOVA](https://github.com/DataSoft/Nova) - Uses honeypots as detectors, looks like a complete system.
    121 121   - [OpenFlow Honeypot (OFPot)](https://github.com/upa/ofpot) - Redirects traffic for unused IPs to a honeypot, built on POX.
    122 122   - [OpenCanary](https://github.com/thinkst/opencanary) - Modular and decentralised honeypot daemon that runs several canary versions of services that alerts when a service is (ab)used.
    skipped 371 lines
    494 494   - [HoneyMap](https://github.com/fw42/honeymap) - Real-time websocket stream of GPS events on a fancy SVG world map.
    495 495   - [HoneyStats](https://sourceforge.net/projects/honeystats/) - Statistical view of the recorded activity on a Honeynet.
    496 496   - [HpfeedsHoneyGraph](https://github.com/yuchincheng/HpfeedsHoneyGraph) - Visualization app to visualize hpfeeds logs.
    497  - - [IVRE](https://github.com/ivre/ivre) - A *network recon framework* that can be used to handle data generated with [Masscanned](https://github.com/ivre/masscanned), and/or scan the scanners that hit your honeypots. For some examples, see [Who's attacking me?](https://isc.sans.edu/forums/diary/Whos+Attacking+Me/21933/) and [Three honeypots and a month after](https://www.serializing.me/2019/01/27/three-honeypots-and-a-month-after/). See also [the website](https://ivre.rocks/) and [some use cases](https://doc.ivre.rocks/en/latest/usage/use-cases.html).
     497 + - [IVRE](https://github.com/ivre/ivre) - Network recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
    498 498   - [Kippo stats](https://github.com/mfontani/kippo-stats) - Mojolicious app to display statistics for your kippo SSH honeypot.
    499 499   - [Kippo-Graph](https://bruteforcelab.com/kippo-graph) - Full featured script to visualize statistics from a Kippo SSH honeypot.
    500 500   - [The Intelligent HoneyNet](https://github.com/jpyorre/IntelligentHoneyNet) - Create actionable information from honeypots.
    skipped 17 lines
Please wait...
Page is in error, reload to recover