├── .travis.yml ├── awesome-check.py ├── CONTRIBUTING.md ├── LICENSE ├── README_CN.md └── README.md /.travis.yml: -------------------------------------------------------------------------------- 1 | language: ruby 2 | rvm: 3 | - 2.2 4 | before_script: 5 | - gem install awesome_bot 6 | script: 7 | - awesome_bot README.md --white-list https://github.com/sindresorhus/awesome,http://hpfriends.honeycloud.net/#/home,https://malwr.com/ 8 | - awesome_bot README_CN.md --white-list https://github.com/sindresorhus/awesome,http://hpfriends.honeycloud.net/#/home,https://malwr.com/ 9 | 10 | -------------------------------------------------------------------------------- /awesome-check.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | 3 | import re 4 | import sys 5 | import urllib2 6 | 7 | with open(sys.argv[1], 'r') as f: 8 | for line in f.readlines(): 9 | if '](http' in line: 10 | for url in re.findall("(http[s?]://[^)]+)", line): 11 | # print url 12 | try: 13 | request = urllib2.Request(url) 14 | request.get_method = lambda : 'HEAD' 15 | resp = urllib2.urlopen(request) 16 | if resp.getcode() != 200: 17 | print 'ERROR - ', line 18 | except urllib2.URLError, e: 19 | print e, line -------------------------------------------------------------------------------- /CONTRIBUTING.md: -------------------------------------------------------------------------------- 1 | # Contribution Guidelines 2 | 3 | Please ensure your pull request adheres to the following guidelines: 4 | 5 | - Search previous suggestions before making a new one, as yours may be a duplicate. 6 | - Make an individual pull request for each suggestion. 7 | - Use the following format: `[PACKAGE](LINK) - DESCRIPTION.` 8 | - New categories, or improvements to the existing categorization are welcome. 9 | - Keep descriptions short and simple, but descriptive. 10 | - End all descriptions with a full stop/period. 11 | - Check your spelling and grammar. 12 | - Make sure your text editor is set to remove trailing whitespace. 13 | 14 | Your contributions are always welcome! Thank you for your suggestions! 15 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | The Artistic License 2.0 2 | 3 | Copyright (c) 2015 jose nazario 4 | 5 | Everyone is permitted to copy and distribute verbatim copies 6 | of this license document, but changing it is not allowed. 7 | 8 | Preamble 9 | 10 | This license establishes the terms under which a given free software 11 | Package may be copied, modified, distributed, and/or redistributed. 12 | The intent is that the Copyright Holder maintains some artistic 13 | control over the development of that Package while still keeping the 14 | Package available as open source and free software. 15 | 16 | You are always permitted to make arrangements wholly outside of this 17 | license directly with the Copyright Holder of a given Package. If the 18 | terms of this license do not permit the full use that you propose to 19 | make of the Package, you should contact the Copyright Holder and seek 20 | a different licensing arrangement. 21 | 22 | Definitions 23 | 24 | "Copyright Holder" means the individual(s) or organization(s) 25 | named in the copyright notice for the entire Package. 26 | 27 | "Contributor" means any party that has contributed code or other 28 | material to the Package, in accordance with the Copyright Holder's 29 | procedures. 30 | 31 | "You" and "your" means any person who would like to copy, 32 | distribute, or modify the Package. 33 | 34 | "Package" means the collection of files distributed by the 35 | Copyright Holder, and derivatives of that collection and/or of 36 | those files. A given Package may consist of either the Standard 37 | Version, or a Modified Version. 38 | 39 | "Distribute" means providing a copy of the Package or making it 40 | accessible to anyone else, or in the case of a company or 41 | organization, to others outside of your company or organization. 42 | 43 | "Distributor Fee" means any fee that you charge for Distributing 44 | this Package or providing support for this Package to another 45 | party. It does not mean licensing fees. 46 | 47 | "Standard Version" refers to the Package if it has not been 48 | modified, or has been modified only in ways explicitly requested 49 | by the Copyright Holder. 50 | 51 | "Modified Version" means the Package, if it has been changed, and 52 | such changes were not explicitly requested by the Copyright 53 | Holder. 54 | 55 | "Original License" means this Artistic License as Distributed with 56 | the Standard Version of the Package, in its current version or as 57 | it may be modified by The Perl Foundation in the future. 58 | 59 | "Source" form means the source code, documentation source, and 60 | configuration files for the Package. 61 | 62 | "Compiled" form means the compiled bytecode, object code, binary, 63 | or any other form resulting from mechanical transformation or 64 | translation of the Source form. 65 | 66 | 67 | Permission for Use and Modification Without Distribution 68 | 69 | (1) You are permitted to use the Standard Version and create and use 70 | Modified Versions for any purpose without restriction, provided that 71 | you do not Distribute the Modified Version. 72 | 73 | 74 | Permissions for Redistribution of the Standard Version 75 | 76 | (2) You may Distribute verbatim copies of the Source form of the 77 | Standard Version of this Package in any medium without restriction, 78 | either gratis or for a Distributor Fee, provided that you duplicate 79 | all of the original copyright notices and associated disclaimers. At 80 | your discretion, such verbatim copies may or may not include a 81 | Compiled form of the Package. 82 | 83 | (3) You may apply any bug fixes, portability changes, and other 84 | modifications made available from the Copyright Holder. The resulting 85 | Package will still be considered the Standard Version, and as such 86 | will be subject to the Original License. 87 | 88 | 89 | Distribution of Modified Versions of the Package as Source 90 | 91 | (4) You may Distribute your Modified Version as Source (either gratis 92 | or for a Distributor Fee, and with or without a Compiled form of the 93 | Modified Version) provided that you clearly document how it differs 94 | from the Standard Version, including, but not limited to, documenting 95 | any non-standard features, executables, or modules, and provided that 96 | you do at least ONE of the following: 97 | 98 | (a) make the Modified Version available to the Copyright Holder 99 | of the Standard Version, under the Original License, so that the 100 | Copyright Holder may include your modifications in the Standard 101 | Version. 102 | 103 | (b) ensure that installation of your Modified Version does not 104 | prevent the user installing or running the Standard Version. In 105 | addition, the Modified Version must bear a name that is different 106 | from the name of the Standard Version. 107 | 108 | (c) allow anyone who receives a copy of the Modified Version to 109 | make the Source form of the Modified Version available to others 110 | under 111 | 112 | (i) the Original License or 113 | 114 | (ii) a license that permits the licensee to freely copy, 115 | modify and redistribute the Modified Version using the same 116 | licensing terms that apply to the copy that the licensee 117 | received, and requires that the Source form of the Modified 118 | Version, and of any works derived from it, be made freely 119 | available in that license fees are prohibited but Distributor 120 | Fees are allowed. 121 | 122 | 123 | Distribution of Compiled Forms of the Standard Version 124 | or Modified Versions without the Source 125 | 126 | (5) You may Distribute Compiled forms of the Standard Version without 127 | the Source, provided that you include complete instructions on how to 128 | get the Source of the Standard Version. Such instructions must be 129 | valid at the time of your distribution. If these instructions, at any 130 | time while you are carrying out such distribution, become invalid, you 131 | must provide new instructions on demand or cease further distribution. 132 | If you provide valid instructions or cease distribution within thirty 133 | days after you become aware that the instructions are invalid, then 134 | you do not forfeit any of your rights under this license. 135 | 136 | (6) You may Distribute a Modified Version in Compiled form without 137 | the Source, provided that you comply with Section 4 with respect to 138 | the Source of the Modified Version. 139 | 140 | 141 | Aggregating or Linking the Package 142 | 143 | (7) You may aggregate the Package (either the Standard Version or 144 | Modified Version) with other packages and Distribute the resulting 145 | aggregation provided that you do not charge a licensing fee for the 146 | Package. Distributor Fees are permitted, and licensing fees for other 147 | components in the aggregation are permitted. The terms of this license 148 | apply to the use and Distribution of the Standard or Modified Versions 149 | as included in the aggregation. 150 | 151 | (8) You are permitted to link Modified and Standard Versions with 152 | other works, to embed the Package in a larger work of your own, or to 153 | build stand-alone binary or bytecode versions of applications that 154 | include the Package, and Distribute the result without restriction, 155 | provided the result does not expose a direct interface to the Package. 156 | 157 | 158 | Items That are Not Considered Part of a Modified Version 159 | 160 | (9) Works (including, but not limited to, modules and scripts) that 161 | merely extend or make use of the Package, do not, by themselves, cause 162 | the Package to be a Modified Version. In addition, such works are not 163 | considered parts of the Package itself, and are not subject to the 164 | terms of this license. 165 | 166 | 167 | General Provisions 168 | 169 | (10) Any use, modification, and distribution of the Standard or 170 | Modified Versions is governed by this Artistic License. By using, 171 | modifying or distributing the Package, you accept this license. Do not 172 | use, modify, or distribute the Package, if you do not accept this 173 | license. 174 | 175 | (11) If your Modified Version has been derived from a Modified 176 | Version made by someone other than you, you are nevertheless required 177 | to ensure that your Modified Version complies with the requirements of 178 | this license. 179 | 180 | (12) This license does not grant you the right to use any trademark, 181 | service mark, tradename, or logo of the Copyright Holder. 182 | 183 | (13) This license includes the non-exclusive, worldwide, 184 | free-of-charge patent license to make, have made, use, offer to sell, 185 | sell, import and otherwise transfer the Package with respect to any 186 | patent claims licensable by the Copyright Holder that are necessarily 187 | infringed by the Package. If you institute patent litigation 188 | (including a cross-claim or counterclaim) against any party alleging 189 | that the Package constitutes direct or contributory patent 190 | infringement, then this Artistic License to you shall terminate on the 191 | date that such litigation is filed. 192 | 193 | (14) Disclaimer of Warranty: 194 | THE PACKAGE IS PROVIDED BY THE COPYRIGHT HOLDER AND CONTRIBUTORS "AS 195 | IS' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES. THE IMPLIED 196 | WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR 197 | NON-INFRINGEMENT ARE DISCLAIMED TO THE EXTENT PERMITTED BY YOUR LOCAL 198 | LAW. UNLESS REQUIRED BY LAW, NO COPYRIGHT HOLDER OR CONTRIBUTOR WILL 199 | BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL 200 | DAMAGES ARISING IN ANY WAY OUT OF THE USE OF THE PACKAGE, EVEN IF 201 | ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 202 | 203 | -------------------------------------------------------------------------------- /README_CN.md: -------------------------------------------------------------------------------- 1 | # 最优秀的蜜罐列表 [![Awesome Honeypots](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) 2 | 3 | 优秀的蜜罐、组件等等相关的工具列表,分为 Web、服务等多个类别,重点放在开源项目上 4 | 5 | 每个类别中没有顺序,按照提交的先后顺序排列,如果您也想提交,请阅读 [指南](CONTRIBUTING.md). 6 | 7 | 探索更多优秀的列表请参阅:[sindresorhus/awesome](https://github.com/sindresorhus/awesome). 8 | 9 | # 目录 10 | 11 | - [相关列表](#related-lists) 12 | - [蜜罐](#honeypots) 13 | - [Honeyd 工具](#honeyd-tools) 14 | - [网络与行为分析](#network-and-artifact-analysis) 15 | - [数据分析工具](#data-tools) 16 | - [指南](#guides) 17 | 18 | ## 相关列表 19 | 20 | - [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools) 网络流量分析 21 | - [awesome-malware-analysis](https://github.com/rshipp/awesome-malware-analysis) 与上表有些重复,更侧重恶意软件分析 22 | 23 | ## 蜜罐 24 | 25 | - 数据库蜜罐 26 | - [Delilah](https://github.com/SecurityTW/delilah) - Python 编写的 Elasticsearch 蜜罐 27 | - [ESPot](https://github.com/mycert/ESPot) - 一个用 NodeJS 编写的 Elasticsearch 蜜罐,用于对 CVE-2014-3120 的利用 28 | - [Elastic honey](https://github.com/jordan-wright/elastichoney) - 简单的 Elasticsearch 蜜罐 29 | - [HoneyMysql](https://github.com/xiaoxiaoleo/HoneyMysql) - 简单 Mysql 蜜罐 30 | - [MongoDB-HoneyProxy](https://github.com/Plazmaz/MongoDB-HoneyProxy) - MongoDB 蜜罐代理 31 | - [MongoDB-HoneyProxyPy](https://github.com/jwxa2015/MongoDB-HoneyProxyPy) - 使用 Python 3 的 MongoDB 蜜罐代理 32 | - [NoSQLpot](https://github.com/torque59/nosqlpot) - NoSQL 蜜罐框架 33 | - [mysql-honeypotd](https://github.com/sjinks/mysql-honeypotd) - C 编写的低交互 MySQL 蜜罐 34 | - [MysqlPot](https://github.com/schmalle/MysqlPot) - MySQL 蜜罐 35 | - [pghoney](https://github.com/betheroot/pghoney) - 低交互 Postgres 蜜罐 36 | - [sticky_elephant](https://github.com/betheroot/sticky_elephant) - 中交互 postgresql 蜜罐 37 | 38 | - Web 蜜罐 39 | - [Bukkit Honeypot](https://github.com/Argomirr/Honeypot) Honeypot - Bukkit 的一个插件 40 | - [EoHoneypotBundle](https://github.com/eymengunay/EoHoneypotBundle) - Symfony2 类型的蜜罐 41 | - [Glastopf](https://github.com/mushorg/glastopf) - Web 应用蜜罐 42 | - [Google Hack Honeypot](http://ghh.sourceforge.net) - 旨在提供针对那些使用搜索引擎探测资源的攻击者的侦察 43 | - [Laravel Application Honeypot](https://github.com/msurguy/Honeypot) - Honeypot - Laravel 应用程序的简单垃圾邮件预防软件包 44 | - [Nodepot](https://github.com/schmalle/Nodepot) - NodeJS Web 应用蜜罐 45 | - [Servletpot](https://github.com/schmalle/servletpot) - Web 应用蜜罐 46 | - [Shadow Daemon](https://shadowd.zecure.org/overview/introduction/) - 用于 PHP、Perl 和 Python 应用程序的模块化Web应用程序防火墙/高交互式蜜罐 47 | - [StrutsHoneypot](https://github.com/Cymmetria/StrutsHoneypot) - 基于 Struts Apache 2 的蜜罐 48 | - [WebTrap](https://github.com/IllusiveNetworks-Labs/WebTrap) - 旨在创建欺骗性网页,重定向到真实网站 49 | - [basic-auth-pot (bap)](https://github.com/bjeborn/basic-auth-pot) bap - HTTP 基本认证蜜罐 50 | - [bwpot](https://github.com/graneed/bwpot) - Web 应用蜜罐 51 | - [django-admin-honeypot](https://github.com/dmpayton/django-admin-honeypot) - 虚假的 Django 管理登录页面,记录未经授权的访问尝试 52 | - [drupo](https://github.com/d1str0/drupot) - Drupal 蜜罐 53 | - [honeyhttpd](https://github.com/bocajspear1/honeyhttpd) - 基于 Python 的 Web 服务器蜜罐构建工具 54 | - [phpmyadmin_honeypot](https://github.com/gfoss/phpmyadmin_honeypot) - - 简单有效的 phpMyAdmin 蜜罐 55 | - [shockpot](https://github.com/threatstream/shockpot) - 检测 Shell Shock 利用尝试的 Web 应用蜜罐 56 | - [smart-honeypot](https://github.com/freak3dot/smart-honeypot) - PHP 脚本编写的智能蜜罐 57 | - Snare/Tanner - Glastopf 的后继者 58 | - [Snare](https://github.com/mushorg/snare) - 下一代高交互 honEypot 59 | - [Tanner](https://github.com/mushorg/tanner) - 评估 SNARE 事件 60 | - [stack-honeypot](https://github.com/CHH/stack-honeypot) - 将针对垃圾邮件机器人的陷阱插入到响应中 61 | - [tomcat-manager-honeypot](https://github.com/helospark/tomcat-manager-honeypot) - Tomcat 蜜罐。记录请求并保存攻击者的 WAR 文件 62 | - WordPress honeypots 63 | - [HonnyPotter](https://github.com/MartinIngesen/HonnyPotter) - WordPress 的登录蜜罐,用于收集和分析失败的登录尝试 64 | - [HoneyPress](https://github.com/dustyfresh/HoneyPress) - Docker 容器中基于 Python 的 WordPress 蜜罐 65 | - [wp-smart-honeypot](https://github.com/freak3dot/wp-smart-honeypot) - 减少垃圾邮件的 WordPress 插件 66 | - [wordpot](https://github.com/gbrindisi/wordpot) - WordPress 蜜罐 67 | 68 | - 服务蜜罐 69 | - [ADBHoney](https://github.com/huuck/ADBHoney) - 安卓低交互蜜罐. 70 | - [AMTHoneypot](https://github.com/packetflare/amthoneypot) - 针对 Intel 的 AMT 固件漏洞(CVE-2017-5689)的蜜罐 71 | - [Ensnare](https://github.com/ahoernecke/ensnare) - 易部署的 Ruby 蜜罐 72 | - [HoneyPy](https://github.com/foospidy/HoneyPy) - 低交互蜜罐 73 | - [Honeygrove](https://github.com/UHH-ISS/honeygrove) - 基于 Twisted 的多用途、模块化蜜罐 74 | - [Honeyport](https://github.com/securitygeneration/Honeyport) - Bash 和 Python 写成的简单 honeyport 75 | - [Honeyprint](https://github.com/glaslos/honeyprint) - 打印机蜜罐 76 | - [Lyrebird](https://hub.docker.com/r/lyrebird/honeypot-base/) - 现代高交互蜜罐框架 77 | - [MICROS honeypot](https://github.com/Cymmetria/micros_honeypot) - 在带有 Oracle Hospitality Simphony 的 Oracle Hospitality Applications (MICROS) 中检测 CVE-2018-2636 的低交互蜜罐 78 | - [RDPy](https://github.com/citronneur/rdpy) - Python 实现的 RDP 蜜罐 79 | - [SMB Honeypot](https://github.com/r0hi7/HoneySMB) - 可以捕获类似 Wannacry 的恶意软件的高交互 SMB 蜜罐 80 | - [Tom's Honeypot](https://github.com/inguardians/toms_honeypot) - 低交互 Python 蜜罐 81 | - [WebLogic honeypot](https://github.com/Cymmetria/weblogic_honeypot) - 在带有 Oracle WebLogic Server 的 Oracle Fusion Middleware 中检测 CVE-2017-10271 的低交互蜜罐 82 | - [WhiteFace Honeypot](https://github.com/csirtgadgets/csirtg-honeypot) - 基于 Twisted 开发的针对 WhiteFace 蜜罐 83 | - [honeycomb_plugins](https://github.com/Cymmetria/honeycomb_plugins) - Honeycomb 插件仓库,Cymmetria 的蜜罐框架 84 | - [honeyntp](https://github.com/fygrave/honeyntp) - NTP 蜜罐 85 | - [honeypot-camera](https://github.com/alexbredo/honeypot-camera) - 相机蜜罐 86 | - [honeypot-ftp](https://github.com/alexbredo/honeypot-ftp) - FTP 蜜罐 87 | - [honeytrap](https://github.com/honeytrap/honeytrap) - 用 Go 编写的高级蜜罐框架,可以连接其他蜜罐 88 | - [pyrdp](https://github.com/gosecure/pyrdp) - Python 3 实现的 RDP 中间人库,能监视连接 89 | - [troje](https://github.com/dutchcoders/troje/) - 围绕 LXC 容器的蜜罐,将每一个服务的连接都放到单独的 LXC 容器内 90 | 91 | - 分布式蜜罐 92 | - [DemonHunter](https://github.com/RevengeComing/DemonHunter) - 低交互蜜罐服务器 93 | 94 | - 反蜜罐 95 | - [kippo_detect](https://github.com/andrew-morris/kippo_detect) - 检测 Kippo 蜜罐 96 | 97 | - ICS/SCADA 蜜罐 98 | - [Conpot](https://github.com/mushorg/conpot) - ICS/SCADA 蜜罐 99 | - [GasPot](https://github.com/sjhilt/GasPot) - Veeder Root Gaurdian AST, 常见于石油、天然气行业 100 | - [SCADA honeynet](http://scadahoneynet.sourceforge.net) - 建立工业网络的蜜罐 101 | - [gridpot](https://github.com/sk4ld/gridpot) - 模拟实际电网的开源蜜罐 102 | - [scada-honeynet](http://www.digitalbond.com/blog/2007/07/24/scada-honeynet-article-in-infragard-publication/) - 模拟流行的 PLC 服务,更好地帮助 SCADA 研究人员了解暴露的控制系统设备的潜在风险 103 | 104 | - 其他/随机 105 | - [DSHP](https://github.com/naorlivne/dshp) - 带有插件化支持的简单蜜罐 106 | - [NOVA](https://github.com/DataSoft/Nova) 看起来像完整系统的蜜罐 107 | - [OpenFlow Honeypot(OFPot)](https://github.com/upa/ofpot) - 基于 POX 的 OpenFlow 蜜罐,将未使用的IP地址的流量重定向到蜜罐中 108 | - [OpenCanary](https://pypi.org/project/opencanary/) - 模块化、分布式蜜罐 109 | - [ciscoasa_honeypot](https://github.com/cymmetria/ciscoasa_honeypot) 用于思科 ASA 低交互蜜罐,检测 CVE-2018-0101 远程代码执行漏洞 110 | - [miniprint](https://github.com/sa7mon/miniprint) - 打印机中交互蜜罐 111 | 112 | - 僵尸网络 C&C 工具 113 | - [Hale](https://github.com/pjlantz/Hale) - 僵尸网络 C&C 监视器 114 | - [dnsMole](https://code.google.com/archive/p/dns-mole/) - 分析 DNS 流量,检测潜在的僵尸网络 C&C 服务器和受感染的主机 115 | 116 | - IPv6 攻击检测工具 117 | - [ipv6-attack-detector](https://github.com/mzweilin/ipv6-attack-detector/) - Honeynet 项目支持的 Googel Summer of Code 2012 项目 118 | 119 | - 动态代码检查工具包 120 | - [Frida](https://www.frida.re) - 注入 JavaScript 来探索Windows、Mac、Linux、iOS 和 Android 上的应用程序 121 | 122 | - 将网站转换为服务器蜜罐 123 | - [HIHAT](http://hihat.sourceforge.net/) - 将任意 PHP 页面转换成基于 Web 的高交互蜜罐 124 | 125 | - 恶意软件收集 126 | - [Kippo-Malware](https://bruteforcelab.com/kippo-malware) - 用于在 Kippo SSH 蜜罐数据库中记录的 URL 上下载恶恶意文件的 Python 脚本 127 | 128 | - 分布式传感器部署 129 | - [Modern Honey Network](https://github.com/threatstream/mhn) - 分布式 Snort 与蜜罐传感器管理,使用虚拟网络,最小指纹的 SNORT 安装,服务器提供隐形侦察与集中管理 130 | 131 | - 网络分析工具 132 | - [Tracexploit](https://code.google.com/archive/p/tracexploit/) - 重放网络数据包 133 | 134 | - 日志匿名工具 135 | - [LogAnon](http://code.google.com/archive/p/loganon/) - 日志匿名库 136 | 137 | - 低交互蜜罐(路由器后门) 138 | - [Honeypot-32764](https://github.com/knalli/honeypot-for-tcp-32764) - 路由器后门蜜罐(TCP 32764). 139 | - [WAPot](https://github.com/lcashdol/WAPot) - 能够观察家庭路由器流量的蜜罐 140 | 141 | - HTTPS 代理 142 | - [mitmproxy](https://mitmproxy.org/) - 拦截、检查、修改、重放流量 143 | 144 | - 系统插桩 145 | - [Sysdig](https://sysdig.com/opensource/) - 捕获 Linux 系统的状态与活动,可以进行保存、过滤与分析的开源系统级探索工具 146 | - [Fibratus](https://github.com/rabbitstack/fibratus) - 用于探索和跟踪 Windows 内核的工具 147 | 148 | - 检测 USB 恶意传播的蜜罐 149 | - [Ghost-usb](https://github.com/honeynet/ghost-usb-honeypot) - 检测通过 USB 存储设备传播恶意软件的蜜罐 150 | 151 | - 数据采集 152 | - [Kippo2MySQL](https://bruteforcelab.com/kippo2mysql) - 从 Kippo 的日志文件中提取一些基本的统计信息插入到数据库中 153 | - [Kippo2ElasticSearch](https://bruteforcelab.com/kippo2elasticsearch) - 用于将 Kippo SSH 蜜罐数据从 MySQL 数据库传输到 ElasticSearch 实例(服务器或集群)的 Python 脚本 154 | 155 | - 被动网络审计框架解析工具 156 | - [Passive Network Audit Framework(pnaf)](https://github.com/jusafing/pnaf) - 被动网络审计框架 157 | 158 | - 虚拟机监控工具 159 | - [Antivmdetect](https://github.com/nsmfoo/antivmdetection) - 用于创建 VirtualBox 虚拟机模版的脚本,使检测虚拟机更困难 160 | - [VMCloak](https://github.com/hatching/vmcloak) - Cuckoo 沙盒的自动虚拟机生成和隐藏 161 | - [vmitools](http://libvmi.com/) - 带有 Python 接口的 C 库,可以轻松监视运行中的虚拟机的底层细节 162 | 163 | - 二进制调试器 164 | - [Hexgolems - Pint Debugger Backend](https://github.com/hexgolems/pint) - 一个调试器后端与 Pin 的 Lua 接口 165 | - [Hexgolems - Schem Debugger Frontend](https://github.com/hexgolems/schem) - 一个调试器前端 166 | 167 | - 移动应用分析工具 168 | - [Androguard](https://github.com/androguard/androguard) - 安卓应用程序逆向工程工具 169 | - [APKinspector](https://github.com/honeynet/apkinspector/) - 带有界面的安卓应用程序分析工具 170 | 171 | - 低交互蜜罐 172 | - [Honeyperl](https://sourceforge.net/projects/honeyperl/) - 基于 Perl 的蜜罐,有很多插件 173 | - [T-Pot](https://github.com/dtag-dev-sec/tpotce) - 为电信服务商 T-Mobile 提供的蜜罐 174 | 175 | - 蜜罐数据融合 176 | - [HFlow2](https://projects.honeynet.org/hflow) - 用于蜜罐/网络分析的数据融合工具 177 | 178 | - 服务器 179 | - [Amun](http://amunhoney.sourceforge.net) - 漏洞模拟蜜罐 180 | - [Artillery](https://github.com/trustedsec/artillery/) - 开源蓝队工具,旨在通过多种办法保护 Linux 和 Windows 操作系统 181 | - [Bait and Switch](http://baitnswitch.sourceforge.net) - 将恶意流量重定向到生产系统镜像的蜜罐 182 | - [Bifrozt](https://github.com/Ziemeck/bifrozt-ansible) - 自动部署带有 ansible 的 bifrozt 183 | - [Conpot](http://conpot.org/) - 低交互的工业控制系统蜜罐 184 | - [Heralding](https://github.com/johnnykv/heralding) - 捕获凭据的蜜罐 185 | - [HoneyWRT](https://github.com/CanadianJeff/honeywrt) - 基于 Python 的低交互蜜罐,旨在模拟攻击者可能攻击的服务或端口 186 | - [Honeyd](https://github.com/provos/honeyd) 请查看[更多 honeyd 工具](#honeyd) 187 | - [Honeysink](http://www.honeynet.org/node/773) - 开源网络陷阱,提供了检测与阻止指定网络上恶意流量的机制 188 | - [Hontel](https://github.com/stamparm/hontel) - Telnet 蜜罐 189 | - [KFSensor](http://www.keyfocus.net/kfsensor/) - 基于 Windows 的入侵检测系统蜜罐 190 | - [LaBrea](http://labrea.sourceforge.net/labrea-info.html) - 接管未使用的 IP 地址,创建对蠕虫、黑客有吸引力的虚拟服务 191 | - [MTPot](https://github.com/Cymmetria/MTPot) - 专注于 Mirai 的开源 Telnet 蜜罐 192 | - [SIREN](https://github.com/blaverick62/SIREN) - 半智能蜜罐网络 - 蜜网只能虚拟环境 193 | - [TelnetHoney](https://github.com/balte/TelnetHoney) - 简单的 telnet 蜜罐 194 | - [UDPot Honeypot](https://github.com/jekil/UDPot) - 简单 UDP / DNS 蜜罐脚本 195 | - [Yet Another Fake Honeypot (YAFH)](https://github.com/fnzv/YAFH) - 使用 Go 编写的简单蜜罐 196 | - [arctic-swallow](https://github.com/ajackal/arctic-swallow) - 低交互蜜罐 197 | - [glutton](https://github.com/mushorg/glutton) - 可喂食蜜罐 198 | - [go-HoneyPot](https://github.com/Mojachieee/go-HoneyPot) - 使用 Go 编写的蜜罐 199 | - [go-emulators](https://github.com/kingtuna/go-emulators) - Go 蜜罐模拟器 200 | - [honeymail](https://github.com/sec51/honeymail) - 使用 Go 编写的 SMTP 蜜罐 201 | - [honeytrap](https://github.com/tillmannw/honeytrap) - 一个用于捕获针对 TCP 和 UDP 服务攻击的低交互蜜罐 202 | - [imap-honey](https://github.com/yvesago/imap-honey) - 使用 Go 编写的 IMAP 蜜罐 203 | - [mwcollectd](https://www.openhub.net/p/mwcollectd) - 联合 nepenthes 和 honeytrap 的最佳功能实现的多功能恶意软件收集蜜罐 204 | - [potd](https://github.com/lnslbrty/potd) - 使用 Linux 的 Namespaces、Seccomp 与 Capabilities 构建针对 OpenWrt/IoT 设备的低中交互 SSH/TCP 蜜罐 205 | - [portlurker](https://github.com/bartnv/portlurker) - 用于协议猜测和安全字符显示的端口监听工具/蜜罐 206 | - [slipm-honeypot](https://github.com/rshipp/slipm-honeypot) - 简单的低交互端口监听蜜罐 207 | - [telnet-iot-honeypot](https://github.com/Phype/telnet-iot-honeypot) - 为了捕获僵尸网络二进制文件,使用 Python 编写的 telnet 蜜罐 208 | - [telnetlogger](https://github.com/robertdavidgraham/telnetlogger) - 跟踪 Mirai 的 Telnet 蜜罐 209 | - [vnclowpot](https://github.com/magisterquis/vnclowpot) - 低交互的 VNC 蜜罐 210 | 211 | - IDS 签名生成 212 | - [Honeycomb](http://www.icir.org/christian/honeycomb/) - 使用蜜罐自动创建签名 213 | 214 | - 查找服务提供商的 ASN 与前缀 215 | - [CC2ASN](http://www.cc2asn.com/) - 简单的查询服务 216 | 217 | - 数据收集/数据共享 218 | - [HPFeeds](https://github.com/rep/hpfeeds/) - 轻量认证的订阅发布协议 219 | 220 | - 集中管理工具 221 | - [PHARM](http://www.nepenthespharm.com/) - 管理、统计、分析你的分布式 Nepenthes 蜜罐 222 | 223 | - 网络连接分析工具 224 | - [Impost](http://impost.sourceforge.net/) - 网络安全审计工具,用于取证分析被破坏/易受攻击的守护进程 225 | 226 | - 蜜罐部署 227 | - [Modern Honeynet Network](http://threatstream.github.io/mhn/) - 让蜜罐的管理与部署更简单 228 | 229 | - Wireshark 的蜜罐扩展 230 | - [Whireshark Extensions](https://www.honeynet.org/project/WiresharkExtensions) - 支持应用针对 PCAP 文件的 Snort IDS 规则与签名 231 | 232 | - 客户端蜜罐 233 | - [CWSandbox / GFI Sandbox](https://www.gfi.com/products-and-solutions/all-products) 234 | - [Capture-HPC-Linux](https://redmine.honeynet.org/projects/linux-capture-hpc/wiki) 235 | - [Capture-HPC-NG](https://github.com/CERT-Polska/HSN-Capture-HPC-NG) 236 | - [Capture-HPC](https://projects.honeynet.org/capture-hpc) - 高交互客户端蜜罐 237 | - [HoneyBOT](http://www.atomicsoftwaresolutions.com/) 238 | - [HoneyC](https://projects.honeynet.org/honeyc) 239 | - [HoneySpider Network](https://github.com/CERT-Polska/hsn2-bundle) - 集成多个客户端蜜罐检测恶意网站的可扩展系统 240 | - [HoneyWeb](https://code.google.com/archive/p/gsoc-honeyweb/) - 为管理与远程共享 Honeyclients 资源而创建的 Web 界面 241 | - [Jsunpack-n](https://github.com/urule99/jsunpack-n) 242 | - [MonkeySpider](http://monkeyspider.sourceforge.net) 243 | - [PhoneyC](https://github.com/honeynet/phoneyc) 244 | - [Pwnypot](https://github.com/shjalayeri/pwnypot) - 高交互客户端蜜罐 245 | - [Rumal](https://github.com/thugs-rumal/) 246 | - [Shelia](https://www.cs.vu.nl/~herbertb/misc/shelia/) 247 | - [Thug](https://buffer.github.io/thug/) 248 | - [Thug Distributed Task Queuing](https://thug-distributed.readthedocs.io/en/latest/index.html) 249 | - [Trigona](https://www.honeynet.org/project/Trigona) 250 | - [URLQuery](https://urlquery.net/) 251 | - [YALIH (Yet Another Low Interaction Honeyclient)](https://github.com/Masood-M/yalih) - 低交互客户端蜜罐,旨在通过签名,异常和模式匹配技术检测恶意网站 252 | 253 | - 蜜罐 254 | - [Deception Toolkit](http://www.all.net/dtk/dtk.html) 255 | - [IMHoneypot](https://github.com/mushorg/imhoneypot) 256 | 257 | - PDF 文档检查工具 258 | - [peepdf](https://github.com/jesparza/peepdf) 259 | 260 | - 混合低/高交互蜜罐 261 | - [HoneyBrid](http://honeybrid.sourceforge.net) 262 | 263 | - SSH 蜜罐 264 | - [Blacknet](https://github.com/morian/blacknet) - SSH 蜜罐系统 265 | - [Cowrie](https://github.com/cowrie/cowrie) - Cowrie SSH 蜜罐 (基于 kippo) 266 | - [DShield docker](https://github.com/xme/dshield-docker) - 启用了 DShield 输出的 Docker 容器 267 | - [HonSSH](https://github.com/tnich/honssh) - 记录客户端与服务器之间所有 SSH 通信 268 | - [HUDINX](https://github.com/Cryptix720/HUDINX) - 用于记录暴力破解的低交互 SSH 蜜罐,记录攻击者全部 Shell 交互 269 | - [Kojoney](http://kojoney.sourceforge.net/) 270 | - [Kojoney2](https://github.com/madirish/kojoney2) - 根据 Kojoney 用 Python 编写的低交互 SSH 蜜罐 271 | - [Kippo](https://github.com/desaster/kippo) - 中交互 SSH 蜜罐 272 | - [Kippo_JunOS](https://github.com/gregcmartin/Kippo_JunOS) - 基于 Kippo 的蜜罐 273 | - [Kojoney2](https://github.com/madirish/kojoney2) - Jose Antonio Coret 使用 Python 编写,基于 Kojoney 的低交互 SSH 蜜罐 274 | - [Kojoney](http://kojoney.sourceforge.net/) - 基于 Python 的低交互蜜罐,使用 Twisted Conch 模拟 SSH 服务 275 | - [LongTail Log Analysis @ Marist College](http://longtail.it.marist.edu/honey/) - 分析 SSH 蜜罐日志 276 | - [Malbait](https://github.com/batchmcnulty/Malbait) - 使用 Perl 实现的 TCP/UDP 蜜罐 277 | - [MockSSH](https://github.com/ncouture/MockSSH) - 支持定义的所有命令的 SSH 服务器 278 | - [cowrie2neo](https://github.com/xlfe/cowrie2neo) - 解析 cowrie 蜜罐日志到 neo4j 数据库 279 | - [go-sshoney](https://github.com/ashmckenzie/go-sshoney) - SSH 蜜罐 280 | - [go0r](https://github.com/fzerorubigd/go0r) - 使用 Go 编写的简单 SSH 蜜罐 281 | - [gohoney](https://github.com/PaulMaddox/gohoney) - 使用 Go 编写的 SSH 蜜罐 282 | - [hived](https://github.com/sahilm/hived) - 基于 Go 编写的蜜罐 283 | - [hnypots-agent)](https://github.com/joshrendek/hnypots-agent) - 记录用户名和密码组合的 SSH 服务器 284 | - [honeypot.go](https://github.com/mdp/honeypot.go) - 使用 Go 编写的 SSH 蜜罐 285 | - [honeyssh](https://github.com/ppacher/honeyssh) - 凭据 dumping 的 SSH 蜜罐 286 | - [hornet](https://github.com/czardoz/hornet) - 支持多虚拟主机的中交互 SSH 蜜罐 287 | - [ssh-auth-logger](https://github.com/JustinAzoff/ssh-auth-logger) - 低\零交互 SSH 蜜罐 288 | - [ssh-honeypot](https://github.com/droberson/ssh-honeypot) - 伪造 SSHD,记录 IP 地址、用户名与密码 289 | - [ssh-honeypot](https://github.com/amv42/sshd-honeypot) - OpenSSH DEAMON 的改版,将命令转发到 Cowrie 290 | - [ssh-honeypotd](https://github.com/sjinks/ssh-honeypotd) - C 编写的低交互 SSH 蜜罐 291 | - [sshForShits](https://github.com/traetox/sshForShits) - 高交互 SSH 蜜罐框架 292 | - [sshesame](https://github.com/jaksi/sshesame) - 记录登录活动的虚假 SSH 服务器 293 | - [sshhipot](https://github.com/magisterquis/sshhipot) - 高交互中间人 SSH 蜜罐 294 | - [sshlowpot](https://github.com/magisterquis/sshlowpot) - Go 编写的低交互 SSH 蜜罐 295 | - [sshsyrup](https://github.com/mkishere/sshsyrup) - 简单的 SSH 蜜罐,捕获终端活动并上传到 asciinema.org 296 | - [twisted-honeypots](https://github.com/lanjelot/twisted-honeypots) - 基于 Twisted 的 SSH\FTP\Telnet 的蜜罐 297 | 298 | - 分布式传感器项目 299 | - [DShield Web Honeypot Project](https://sites.google.com/site/webhoneypotsite/) 300 | 301 | - PCAP 分析工具 302 | - [Honeysnap](https://projects.honeynet.org/honeysnap/) 303 | 304 | - 网络流量重定向工具 305 | - [Honeywall](https://projects.honeynet.org/honeywall/) 306 | 307 | - 混合内容的分布式蜜罐 308 | - [HoneyDrive](https://bruteforcelab.com/honeydrive) 309 | 310 | - 蜜罐传感器 311 | - [Honeeepi](https://redmine.honeynet.org/projects/honeeepi/wiki) - Raspberry Pi 上一款基于定制 Raspbian 操作系统的蜜罐 312 | 313 | - File carving 314 | - [TestDisk & PhotoRec](https://www.cgsecurity.org/) 315 | 316 | - Windows 可用的行为分析工具 317 | - [Capture BAT](https://www.honeynet.org/node/315) 318 | 319 | - Live CD 320 | - [DAVIX](https://www.secviz.org/node/89) - DAVIX Released 321 | 322 | - Spamtrap 323 | - [Mail::SMTP::Honeypot](https://metacpan.org/pod/release/MIKER/Mail-SMTP-Honeypot-0.11/Honeypot.pm) - 提供标准 SMTP 服务器工具的 Perl 模块 324 | - [Mailoney](https://github.com/awhitehatter/mailoney) - Python 编写的 SMTP 蜜罐,具有开放中继、凭据记录等功能 325 | - [SendMeSpamIDS.py](https://github.com/johestephan/VerySimpleHoneypot) - 获得所有 IDS 和分析设备的简单 SMTP 326 | - [Shiva](https://github.com/shiva-spampot/shiva) - 垃圾邮件蜜罐与智能分析工具 327 | - [Shiva The Spam Honeypot Tips And Tricks For Getting It Up And Running](https://www.pentestpartners.com/security-blog/shiva-the-spam-honeypot-tips-and-tricks-for-getting-it-up-and-running/) 328 | - [SpamHAT](https://github.com/miguelraulb/spamhat) - 垃圾邮件蜜罐工具 329 | - [Spamhole](http://www.spamhole.net/) 330 | - [honeypot](https://github.com/jadb/honeypot) - 蜜罐项目组非官方 PHP 的 SDK 331 | - [spamd](http://man.openbsd.org/cgi-bin/man.cgi?query=spamd%26apropos=0%26sektion=0%26manpath=OpenBSD+Current%26arch=i386%26format=html) 332 | 333 | - 商业蜜网 334 | - [Cymmetria Mazerunner](https://cymmetria.com/products/mazerunner/) - 可引导攻击者远离真实目标,并创建攻击痕迹跟踪 335 | 336 | - 服务器(蓝牙) 337 | - [Bluepot](https://github.com/andrewmichaelsmith/bluepot) 338 | 339 | - Android 应用程序动态分析 340 | - [Droidbox](https://code.google.com/archive/p/droidbox/) 341 | 342 | - Docker 化的低交互蜜罐 343 | - [Docker honeynet](https://github.com/sreinhardt/Docker-Honeynet) - 部署与 Docker 容器中的一些蜜网工具 344 | - [Dockerized Thug](https://hub.docker.com/r/honeynet/thug/) - 基于 [Thug](https://github.com/buffer/thug) 的 Docker 蜜罐,用于分析恶意 Web 内容 345 | - [Dockerpot](https://github.com/mrschyte/dockerpot) - 基于 Docker 的蜜罐 346 | - [Manuka](https://github.com/andrewmichaelsmith/manuka) - 基于 Docker 的蜜罐 (Dionaea & Kippo). 347 | - [mhn-core-docker](https://github.com/MattCarothers/mhn-core-docker) - 在 Docker 中实现的现代蜜网核心元素 348 | 349 | - 网络分析 350 | - [Quechua](https://bitbucket.org/zaccone/quechua) 351 | 352 | - SIP Server 353 | - [Artemnesia VoIP](http://artemisa.sourceforge.net) 354 | 355 | - IOT 蜜罐 356 | - [HoneyThing](https://github.com/omererdem/honeything) - TR-069 蜜罐 357 | - [Kako](https://github.com/darkarnium/kako) - 常见嵌入式设备漏洞的蜜罐 358 | 359 | - Honeytokens 360 | - [CanaryTokens](https://github.com/thinkst/canarytokens) - Honeytoken 生成器,Dashboard 在 [CanaryTokens.org](https://canarytokens.org/generate) 361 | - [Honeybits](https://github.com/0x4D31/honeybits) - 旨在通过在生产服务器和工作站中传播 breadcrumbs 和 honeytokens 来诱使攻击者进入蜜罐,从而提高诱捕率 362 | - [Honeyλ (HoneyLambda)](https://github.com/0x4D31/honeylambda) - 简单的无服务器应用程序,旨在创建和监控 AWS Lambda 和 Amazon API Gateway 之上的网址 honeytokens 363 | - [dcept](https://github.com/secureworks/dcept) - 部署、检测活动目录使用情况的 honeytokens 364 | - [honeyku](https://github.com/0x4D31/honeyku) - 基于 Heroku 的 Web 蜜罐 365 | 366 | 367 | ## Honeyd 工具 368 | 369 | - Honeyd 插件 370 | - [Honeycomb](http://www.honeyd.org/tools.php) 371 | 372 | - Honeyd 查看工具 373 | - [Honeyview](http://honeyview.sourceforge.net/) 374 | 375 | - Honeyd 与 MySQL 的连接 376 | - [Honeyd2MySQL](https://bruteforcelab.com/honeyd2mysql) 377 | 378 | - Honeyd 统计数据可视化脚本 379 | - [Honeyd-Viz](https://bruteforcelab.com/honeyd-viz) 380 | 381 | - Honeyd 统计 382 | - [Honeydsum.pl](https://github.com/DataSoft/Honeyd/blob/master/scripts/misc/honeydsum-v0.3/honeydsum.pl) 383 | 384 | 385 | ## 网络与行为分析 386 | 387 | - 沙盒 388 | - [Argos](http://www.few.vu.nl/argos/) - 用于捕获零日攻击的模拟器 389 | - [COMODO automated sandbox](https://help.comodo.com/topic-72-1-451-4768-.html) 390 | - [Cuckoo](https://cuckoosandbox.org/) - 领先的开源自动化恶意软件分析系统 391 | - [Pylibemu](https://github.com/buffer/pylibemu) - Libemu Cython 392 | - [RFISandbox](https://monkey.org/~jose/software/rfi-sandbox/) - 使用 PHP 5.x 脚本在 [funcall](https://pecl.php.net/package/funcall) 上构建的沙盒 393 | - [dorothy2](https://github.com/m4rco-/dorothy2) - Ruby 编写的恶意软件/僵尸网络分析框架 394 | - [imalse](https://github.com/hbhzwj/imalse) - 集成的恶意软件仿真工具与模拟工具 395 | - [libemu](https://github.com/buffer/libemu) - Shellcode 模拟库,对 Shellcode 检测十分有用 396 | 397 | - 沙盒即服务 398 | - [Hybrid Analysis](https://www.hybrid-analysis.com) - 由 Payload Security 提供的免费恶意软件分析服务,可使用其独特的混合分析技术检测和分析未知威胁 399 | - [Joebox Cloud](https://jbxcloud.joesecurity.org/login) - 确定 Windows、Android 和 Mac OS X 上的恶意文件(包括 PE、PDF、DOC、PPT、XLS、APK、URL 和 MachO)的行为,判断其是否存在可疑活动 400 | - [VirusTotal](https://www.virustotal.com/) 401 | - [malwr.com](https://malwr.com/) - 提供免费恶意软件分析服务与社区 402 | 403 | 404 | ## 数据分析工具 405 | 406 | - 前端 407 | - [DionaeaFR](https://github.com/rubenespadas/DionaeaFR) - Dionaea 蜜罐前端 Web 408 | - [Django-kippo](https://github.com/jedie/django-kippo) - 用于 kippo SSH 蜜罐的 Django 程序 409 | - [Shockpot-Frontend](https://github.com/GovCERT-CZ/Shockpot-Frontend) - 用于可视化 Shockpot 蜜罐中数据的脚本 410 | - [Tango](https://github.com/aplura/Tango) - 使用 Splunk 处理蜜罐情报 411 | - [Wordpot-Frontend](https://github.com/GovCERT-CZ/Wordpot-Frontend) - 用于可视化 Wordpot 蜜罐中数据的脚本 412 | - [honeyalarmg2](https://github.com/schmalle/honeyalarmg2) - 用于显示蜜罐数据的简化 UI 413 | - [honeypotDisplay](https://github.com/Joss-Steward/honeypotDisplay) - 展示 SSH 蜜罐的 Flask 网站 414 | 415 | - 可视化 416 | - [Acapulco](https://github.com/hgascon/acapulco) - 自动攻击群体图构建 417 | - [Afterglow Cloud](https://github.com/ayrus/afterglow-cloud) 418 | - [Afterglow](http://afterglow.sourceforge.net/) 419 | - [Glastopf Analytics](https://github.com/katkad/Glastopf-Analytics) - 简单蜜罐统计 420 | - [HoneyMalt](https://github.com/SneakersInc/HoneyMalt) - Maltego 转换映射蜜罐系统 421 | - [HoneyMap](https://github.com/fw42/honeymap) - 显示实时 Websocket 流的 SVG 地图 422 | - [HoneyStats](https://sourceforge.net/projects/honeystats/) - Honeynet 的统计视图 423 | - [HpfeedsHoneyGraph](https://github.com/yuchincheng/HpfeedsHoneyGraph) - 可视化 hpfeeds 日志的程序 424 | - [Kippo stats](https://github.com/mfontani/kippo-stats) - 为 kippo SSH 蜜罐展示数据的程序 425 | - [Kippo-Graph](https://bruteforcelab.com/kippo-graph) - 用于可视化 Kippo 蜜罐中数据的脚本 426 | - [The Intelligent HoneyNet](https://github.com/jpyorre/IntelligentHoneyNet) - 试图创建蜜罐中可操作信息的智能蜜网项目 427 | - [ovizart](https://github.com/oguzy/ovizart) - 可视化网络流量分析 428 | 429 | 430 | ## 指南 431 | 432 | - [T-Pot: 多蜜罐平台](https://dtag-dev-sec.github.io/mediator/feature/2015/03/17/concept.html) 433 | - [蜜罐 (Dionaea and kippo) 设置脚本](https://github.com/andrewmichaelsmith/honeypot-setup-script/) 434 | 435 | - 部署 436 | - [Dionaea and EC2 in 20 Minutes](http://andrewmichaelsmith.com/2012/03/dionaea-honeypot-on-ec2-in-20-minutes/) - 在 EC2 上设置 Dionaea 的教程 437 | - [Using a Raspberry Pi honeypot to contribute data to DShield/ISC](https://isc.sans.edu/diary/22680) - 基于 Raspberry Pi 的系统可以收集比防火墙日志更丰富的日志 438 | - [honeypotpi](https://github.com/free5ty1e/honeypotpi) - 将 Raspberry Pi 变成 HoneyPot Pi 的脚本 439 | 440 | - 研究论文 441 | - [Honeypot research papers](https://github.com/shbhmsingh72/Honeypot-Research-Papers) - 研究蜜罐论文的 PDF 442 | - [vEYE](https://link.springer.com/article/10.1007%2Fs10115-008-0137-3) - 自传播蠕虫行为痕迹的检测与分析 443 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Awesome Honeypots [![Awesome Honeypots](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome) 2 | 3 | A curated list of awesome honeypots, plus related components and much more, divided into categories such as Web, services, and others, with a focus on free and open source projects. 4 | 5 | There is no pre-established order of items in each category, the order is for contribution. If you want to contribute, please read the [guide](CONTRIBUTING.md). 6 | 7 | Discover more awesome lists at [sindresorhus/awesome](https://github.com/sindresorhus/awesome). 8 | 9 | # Contents 10 | 11 | - [Related Lists](#related-lists) 12 | - [Honeypots](#honeypots) 13 | - [Honeyd Tools](#honeyd-tools) 14 | - [Network and Artifact Analysis](#network-and-artifact-analysis) 15 | - [Data Tools](#data-tools) 16 | - [Guides](#guides) 17 | 18 | ## Related Lists 19 | 20 | - [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools) - Useful in network traffic analysis. 21 | - [awesome-malware-analysis](https://github.com/rshipp/awesome-malware-analysis) - Some overlap here for artifact analysis. 22 | 23 | ## Honeypots 24 | 25 | - Database Honeypots 26 | - [Delilah](https://github.com/SecurityTW/delilah) - Elasticsearch Honeypot written in Python (originally from Novetta). 27 | - [ESPot](https://github.com/mycert/ESPot) - Elasticsearch honeypot written in NodeJS, to capture every attempts to exploit CVE-2014-3120. 28 | - [Elastic honey](https://github.com/jordan-wright/elastichoney) - Simple Elasticsearch Honeypot. 29 | - [HoneyMysql](https://github.com/xiaoxiaoleo/HoneyMysql) - Simple Mysql honeypot project. 30 | - [MongoDB-HoneyProxy](https://github.com/Plazmaz/MongoDB-HoneyProxy) - MongoDB honeypot proxy. 31 | - [MongoDB-HoneyProxyPy](https://github.com/jwxa2015/MongoDB-HoneyProxyPy) - MongoDB honeypot proxy by python3. 32 | - [NoSQLpot](https://github.com/torque59/nosqlpot) - Honeypot framework built on a NoSQL-style database. 33 | - [mysql-honeypotd](https://github.com/sjinks/mysql-honeypotd) - Low interaction MySQL honeypot written in C. 34 | - [MysqlPot](https://github.com/schmalle/MysqlPot) - MySQL honeypot, still very early stage. 35 | - [pghoney](https://github.com/betheroot/pghoney) - Low-interaction Postgres Honeypot. 36 | - [sticky_elephant](https://github.com/betheroot/sticky_elephant) - Medium interaction postgresql honeypot. 37 | 38 | - Web honeypots 39 | - [EoHoneypotBundle](https://github.com/eymengunay/EoHoneypotBundle) - Honeypot type for Symfony2 forms. 40 | - [Glastopf](https://github.com/mushorg/glastopf) - Web Application Honeypot. 41 | - [Google Hack Honeypot](http://ghh.sourceforge.net) - Designed to provide reconnaissance against attackers that use search engines as a hacking tool against your resources. 42 | - [Laravel Application Honeypot](https://github.com/msurguy/Honeypot) - Simple spam prevention package for Laravel applications. 43 | - [Nodepot](https://github.com/schmalle/Nodepot) - NodeJS web application honeypot. 44 | - [Servletpot](https://github.com/schmalle/servletpot) - Web application Honeypot. 45 | - [Shadow Daemon](https://shadowd.zecure.org/overview/introduction/) - Modular Web Application Firewall / High-Interaction Honeypot for PHP, Perl, and Python apps. 46 | - [StrutsHoneypot](https://github.com/Cymmetria/StrutsHoneypot) - Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers. 47 | - [WebTrap](https://github.com/IllusiveNetworks-Labs/WebTrap) - Designed to create deceptive webpages to deceive and redirect attackers away from real websites. 48 | - [basic-auth-pot (bap)](https://github.com/bjeborn/basic-auth-pot) - HTTP Basic Authentication honeypot. 49 | - [bwpot](https://github.com/graneed/bwpot) - Breakable Web applications honeyPot. 50 | - [django-admin-honeypot](https://github.com/dmpayton/django-admin-honeypot) - Fake Django admin login screen to notify admins of attempted unauthorized access. 51 | - [drupo](https://github.com/d1str0/drupot) - Drupal Honeypot. 52 | - [honeyhttpd](https://github.com/bocajspear1/honeyhttpd) - Python-based web server honeypot builder. 53 | - [phpmyadmin_honeypot](https://github.com/gfoss/phpmyadmin_honeypot) - Simple and effective phpMyAdmin honeypot. 54 | - [shockpot](https://github.com/threatstream/shockpot) - WebApp Honeypot for detecting Shell Shock exploit attempts. 55 | - [smart-honeypot](https://github.com/freak3dot/smart-honeypot) - PHP Script demonstrating a smart honey pot. 56 | - Snare/Tanner - successors to Glastopf 57 | - [Snare](https://github.com/mushorg/snare) - Super Next generation Advanced Reactive honeypot. 58 | - [Tanner](https://github.com/mushorg/tanner) - Evaluating SNARE events. 59 | - [stack-honeypot](https://github.com/CHH/stack-honeypot) - Inserts a trap for spam bots into responses. 60 | - [tomcat-manager-honeypot](https://github.com/helospark/tomcat-manager-honeypot) - Honeypot that mimics Tomcat manager endpoints. Logs requests and saves attacker's WAR file for later study 61 | - WordPress honeypots 62 | - [HonnyPotter](https://github.com/MartinIngesen/HonnyPotter) - WordPress login honeypot for collection and analysis of failed login attempts. 63 | - [HoneyPress](https://github.com/dustyfresh/HoneyPress) - Python based WordPress honeypot in a Docker container. 64 | - [wp-smart-honeypot](https://github.com/freak3dot/wp-smart-honeypot) - WordPress plugin to reduce comment spam with a smarter honeypot. 65 | - [wordpot](https://github.com/gbrindisi/wordpot) - WordPress Honeypot. 66 | 67 | - Service Honeypots 68 | - [ADBHoney](https://github.com/huuck/ADBHoney) - Low interaction honeypot that simulates an Android device running Android Debug Bridge (ADB) server process. 69 | - [AMTHoneypot](https://github.com/packetflare/amthoneypot) - Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689. 70 | - [Ensnare](https://github.com/ahoernecke/ensnare) - Easy to deploy Ruby honeypot. 71 | - [HoneyPy](https://github.com/foospidy/HoneyPy) - Low interaction honeypot. 72 | - [Honeygrove](https://github.com/UHH-ISS/honeygrove) - Multi-purpose modular honeypot based on Twisted. 73 | - [Honeyport](https://github.com/securitygeneration/Honeyport) - Simple honeyport written in Bash and Python. 74 | - [Honeyprint](https://github.com/glaslos/honeyprint) - Printer honeypot. 75 | - [Lyrebird](https://hub.docker.com/r/lyrebird/honeypot-base/) - Modern high-interaction honeypot framework. 76 | - [MICROS honeypot](https://github.com/Cymmetria/micros_honeypot) - Low interaction honeypot to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS). 77 | - [RDPy](https://github.com/citronneur/rdpy) - Microsoft Remote Desktop Protocol (RDP) honeypot implemented in Python. 78 | - [SMB Honeypot](https://github.com/r0hi7/HoneySMB) - High interaction SMB service honeypot capable of capturing wannacry-like Malware. 79 | - [Tom's Honeypot](https://github.com/inguardians/toms_honeypot) - Low interaction Python honeypot. 80 | - [WebLogic honeypot](https://github.com/Cymmetria/weblogic_honeypot) - Low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. 81 | - [WhiteFace Honeypot](https://github.com/csirtgadgets/csirtg-honeypot) - Twisted based honeypot for WhiteFace. 82 | - [honeycomb_plugins](https://github.com/Cymmetria/honeycomb_plugins) - Plugin repository for Honeycomb, the honeypot framework by Cymmetria. 83 | - [honeyntp](https://github.com/fygrave/honeyntp) - NTP logger/honeypot. 84 | - [honeypot-camera](https://github.com/alexbredo/honeypot-camera) - Observation camera honeypot. 85 | - [honeypot-ftp](https://github.com/alexbredo/honeypot-ftp) - FTP Honeypot. 86 | - [honeytrap](https://github.com/honeytrap/honeytrap) - Advanced Honeypot framework written in Go that can be connected with other honeypot software. 87 | - [pyrdp](https://github.com/gosecure/pyrdp) - RDP man-in-the-middle and library for Python 3 with the ability to watch connections live or after the fact. 88 | - [troje](https://github.com/dutchcoders/troje/) - Honeypot that runs each connection with the service within a seperate LXC container. 89 | 90 | - Distributed Honeypots 91 | - [DemonHunter](https://github.com/RevengeComing/DemonHunter) - Low interaction honeypot server. 92 | 93 | - Anti-honeypot stuff 94 | - [kippo_detect](https://github.com/andrew-morris/kippo_detect) - Offensive component that detects the presence of the kippo honeypot. 95 | 96 | - ICS/SCADA honeypots 97 | - [Conpot](https://github.com/mushorg/conpot) - ICS/SCADA honeypot. 98 | - [GasPot](https://github.com/sjhilt/GasPot) - Veeder Root Gaurdian AST, common in the oil and gas industry. 99 | - [SCADA honeynet](http://scadahoneynet.sourceforge.net) - Building Honeypots for Industrial Networks. 100 | - [gridpot](https://github.com/sk4ld/gridpot) - Open source tools for realistic-behaving electric grid honeynets. 101 | - [scada-honeynet](http://www.digitalbond.com/blog/2007/07/24/scada-honeynet-article-in-infragard-publication/) - Mimics many of the services from a popular PLC and better helps SCADA researchers understand potential risks of exposed control system devices. 102 | 103 | - Other/random 104 | - [Damn Simple Honeypot (DSHP)](https://github.com/naorlivne/dshp) - Honeypot framework with pluggable handlers. 105 | - [NOVA](https://github.com/DataSoft/Nova) - Uses honeypots as detectors, looks like a complete system. 106 | - [OpenFlow Honeypot (OFPot)](https://github.com/upa/ofpot) - Redirects traffic for unused IPs to a honeypot, built on POX. 107 | - [OpenCanary](https://github.com/thinkst/opencanary) - Modular and decentralised honeypot daemon that runs several canary versions of services that alerts when a service is (ab)used. 108 | - [ciscoasa_honeypot](https://github.com/cymmetria/ciscoasa_honeypot) A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability. 109 | - [miniprint](https://github.com/sa7mon/miniprint) - A medium interaction printer honeypot. 110 | 111 | - Botnet C2 tools 112 | - [Hale](https://github.com/pjlantz/Hale) - Botnet command and control monitor. 113 | - [dnsMole](https://code.google.com/archive/p/dns-mole/) - Analyses DNS traffic and potentionaly detect botnet command and control server activity, along with infected hosts. 114 | 115 | - IPv6 attack detection tool 116 | - [ipv6-attack-detector](https://github.com/mzweilin/ipv6-attack-detector/) - Google Summer of Code 2012 project, supported by The Honeynet Project organization. 117 | 118 | - Dynamic code instrumentation toolkit 119 | - [Frida](https://www.frida.re) - Inject JavaScript to explore native apps on Windows, Mac, Linux, iOS and Android. 120 | 121 | - Tool to convert website to server honeypots 122 | - [HIHAT](http://hihat.sourceforge.net/) - Transform arbitrary PHP applications into web-based high-interaction Honeypots. 123 | 124 | - Malware collector 125 | - [Kippo-Malware](https://bruteforcelab.com/kippo-malware) - Python script that will download all malicious files stored as URLs in a Kippo SSH honeypot database. 126 | 127 | - Distributed sensor deployment 128 | - [Community Honey Network](https://communityhoneynetwork.readthedocs.io/en/stable/) - CHN aims to make deployments honeypots and honeypot management tools easy and flexible. The default deployment method uses Docker Compose and Docker to deploy with a few simple commands. 129 | - [Modern Honey Network](https://github.com/threatstream/mhn) - Multi-snort and honeypot sensor management, uses a network of VMs, small footprint SNORT installations, stealthy dionaeas, and a centralized server for management. 130 | 131 | - Network Analysis Tool 132 | - [Tracexploit](https://code.google.com/archive/p/tracexploit/) - Replay network packets. 133 | 134 | - Log anonymizer 135 | - [LogAnon](http://code.google.com/archive/p/loganon/) - Log anonymization library that helps having anonymous logs consistent between logs and network captures. 136 | 137 | - Low interaction honeypot (router back door) 138 | - [Honeypot-32764](https://github.com/knalli/honeypot-for-tcp-32764) - Honeypot for router backdoor (TCP 32764). 139 | - [WAPot](https://github.com/lcashdol/WAPot) - Honeypot that can be used to observe traffic directed at home routers. 140 | 141 | - honeynet farm traffic redirector 142 | - [Honeymole](https://web.archive.org/web/20100326040550/http://www.honeynet.org.pt:80/index.php/HoneyMole) - Deploy multiple sensors that redirect traffic to a centralized collection of honeypots. 143 | 144 | - HTTPS Proxy 145 | - [mitmproxy](https://mitmproxy.org/) - Allows traffic flows to be intercepted, inspected, modified, and replayed. 146 | 147 | - System instrumentation 148 | - [Sysdig](https://sysdig.com/opensource/) - Open source, system-level exploration allows one to capture system state and activity from a running GNU/Linux instance, then save, filter, and analyze the results. 149 | - [Fibratus](https://github.com/rabbitstack/fibratus) - Tool for exploration and tracing of the Windows kernel. 150 | 151 | - Honeypot for USB-spreading malware 152 | - [Ghost-usb](https://github.com/honeynet/ghost-usb-honeypot) - Honeypot for malware that propagates via USB storage devices. 153 | 154 | - Data Collection 155 | - [Kippo2MySQL](https://bruteforcelab.com/kippo2mysql) - Extracts some very basic stats from Kippo’s text-based log files and inserts them in a MySQL database. 156 | - [Kippo2ElasticSearch](https://bruteforcelab.com/kippo2elasticsearch) - Python script to transfer data from a Kippo SSH honeypot MySQL database to an ElasticSearch instance (server or cluster). 157 | 158 | - Passive network audit framework parser 159 | - [Passive Network Audit Framework (pnaf)](https://github.com/jusafing/pnaf) - Framework that combines multiple passive and automated analysis techniques in order to provide a security assessment of network platforms. 160 | 161 | - VM monitoring and tools 162 | - [Antivmdetect](https://github.com/nsmfoo/antivmdetection) - Script to create templates to use with VirtualBox to make VM detection harder. 163 | - [VMCloak](https://github.com/hatching/vmcloak) - Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox. 164 | - [vmitools](http://libvmi.com/) - C library with Python bindings that makes it easy to monitor the low-level details of a running virtual machine. 165 | 166 | - Binary debugger 167 | - [Hexgolems - Pint Debugger Backend](https://github.com/hexgolems/pint) - Debugger backend and LUA wrapper for PIN. 168 | - [Hexgolems - Schem Debugger Frontend](https://github.com/hexgolems/schem) - Debugger frontend. 169 | 170 | - Mobile Analysis Tool 171 | - [Androguard](https://github.com/androguard/androguard) - Reverse engineering, Malware and goodware analysis of Android applications and more. 172 | - [APKinspector](https://github.com/honeynet/apkinspector/) - Powerful GUI tool for analysts to analyze the Android applications. 173 | 174 | - Low interaction honeypot 175 | - [Honeyperl](https://sourceforge.net/projects/honeyperl/) - Honeypot software based in Perl with plugins developed for many functions like : wingates, telnet, squid, smtp, etc. 176 | - [T-Pot](https://github.com/dtag-dev-sec/tpotce) - All in one honeypot appliance from telecom provider T-Mobile 177 | 178 | - Honeynet data fusion 179 | - [HFlow2](https://projects.honeynet.org/hflow) - Data coalesing tool for honeynet/network analysis. 180 | 181 | - Server 182 | - [Amun](http://amunhoney.sourceforge.net) - Vulnerability emulation honeypot. 183 | - [Artillery](https://github.com/trustedsec/artillery/) - Open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods. 184 | - [Bait and Switch](http://baitnswitch.sourceforge.net) - Redirects all hostile traffic to a honeypot that is partially mirroring your production system. 185 | - [Bifrozt](https://github.com/Ziemeck/bifrozt-ansible) - Automatic deploy bifrozt with ansible. 186 | - [Conpot](http://conpot.org/) - Low interactive server side Industrial Control Systems honeypot. 187 | - [Heralding](https://github.com/johnnykv/heralding) - Credentials catching honeypot. 188 | - [HoneyWRT](https://github.com/CanadianJeff/honeywrt) - Low interaction Python honeypot designed to mimic services or ports that might get targeted by attackers. 189 | - [Honeyd](https://github.com/provos/honeyd) - See [honeyd tools](#honeyd-tools). 190 | - [Honeysink](http://www.honeynet.org/node/773) - Open source network sinkhole that provides a mechanism for detection and prevention of malicious traffic on a given network. 191 | - [Hontel](https://github.com/stamparm/hontel) - Telnet Honeypot. 192 | - [KFSensor](http://www.keyfocus.net/kfsensor/) - Windows based honeypot Intrusion Detection System (IDS). 193 | - [LaBrea](http://labrea.sourceforge.net/labrea-info.html) - Takes over unused IP addresses, and creates virtual servers that are attractive to worms, hackers, and other denizens of the Internet. 194 | - [MTPot](https://github.com/Cymmetria/MTPot) - Open Source Telnet Honeypot, focused on Mirai malware. 195 | - [SIREN](https://github.com/blaverick62/SIREN) - Semi-Intelligent HoneyPot Network - HoneyNet Intelligent Virtual Environment. 196 | - [TelnetHoney](https://github.com/balte/TelnetHoney) - Simple telnet honeypot. 197 | - [UDPot Honeypot](https://github.com/jekil/UDPot) - Simple UDP/DNS honeypot scripts. 198 | - [Yet Another Fake Honeypot (YAFH)](https://github.com/fnzv/YAFH) - Simple honeypot written in Go. 199 | - [arctic-swallow](https://github.com/ajackal/arctic-swallow) - Low interaction honeypot. 200 | - [glutton](https://github.com/mushorg/glutton) - All eating honeypot. 201 | - [go-HoneyPot](https://github.com/Mojachieee/go-HoneyPot) - Honeypot server written in Go. 202 | - [go-emulators](https://github.com/kingtuna/go-emulators) - Honeypot Golang emulators. 203 | - [honeymail](https://github.com/sec51/honeymail) - SMTP honeypot written in Golang. 204 | - [honeytrap](https://github.com/tillmannw/honeytrap) - Low-interaction honeypot and network security tool written to catch attacks against TCP and UDP services. 205 | - [imap-honey](https://github.com/yvesago/imap-honey) - IMAP honeypot written in Golang. 206 | - [mwcollectd](https://www.openhub.net/p/mwcollectd) - Versatile malware collection daemon, uniting the best features of nepenthes and honeytrap. 207 | - [potd](https://github.com/lnslbrty/potd) - Highly scalable low- to medium-interaction SSH/TCP honeypot designed for OpenWrt/IoT devices leveraging several Linux kernel features, such as namespaces, seccomp and thread capabilities. 208 | - [portlurker](https://github.com/bartnv/portlurker) - Port listener in Rust with protocol guessing and safe string display. 209 | - [slipm-honeypot](https://github.com/rshipp/slipm-honeypot) - Simple low-interaction port monitoring honeypot. 210 | - [telnet-iot-honeypot](https://github.com/Phype/telnet-iot-honeypot) - Python telnet honeypot for catching botnet binaries. 211 | - [telnetlogger](https://github.com/robertdavidgraham/telnetlogger) - Telnet honeypot designed to track the Mirai botnet. 212 | - [vnclowpot](https://github.com/magisterquis/vnclowpot) - Low interaction VNC honeypot. 213 | 214 | 215 | - IDS signature generation 216 | - [Honeycomb](http://www.icir.org/christian/honeycomb/) - Automated signature creation using honeypots. 217 | 218 | - Lookup service for AS-numbers and prefixes 219 | - [CC2ASN](http://www.cc2asn.com/) - Simple lookup service for AS-numbers and prefixes belonging to any given country in the world. 220 | 221 | - Data Collection / Data Sharing 222 | - [HPfriends](http://hpfriends.honeycloud.net/#/home) - Honeypot data-sharing platform. 223 | - [hpfriends - real-time social data-sharing](https://heipei.io/sigint-hpfriends/) - Presentation about HPFriends feed system 224 | - [HPFeeds](https://github.com/rep/hpfeeds/) - Lightweight authenticated publish-subscribe protocol. 225 | 226 | - Central management tool 227 | - [PHARM](http://www.nepenthespharm.com/) - Manage, report, and analyze your distributed Nepenthes instances. 228 | 229 | - Network connection analyzer 230 | - [Impost](http://impost.sourceforge.net/) - Network security auditing tool designed to analyze the forensics behind compromised and/or vulnerable daemons. 231 | 232 | - Honeypot deployment 233 | - [Modern Honeynet Network](http://threatstream.github.io/mhn/) - Streamlines deployment and management of secure honeypots. 234 | 235 | - Honeypot extensions to Wireshark 236 | - [Whireshark Extensions](https://www.honeynet.org/project/WiresharkExtensions) - Apply Snort IDS rules and signatures against packet capture files using Wireshark. 237 | 238 | 239 | - Client 240 | - [CWSandbox / GFI Sandbox](https://www.gfi.com/products-and-solutions/all-products) 241 | - [Capture-HPC-Linux](https://redmine.honeynet.org/projects/linux-capture-hpc/wiki) 242 | - [Capture-HPC-NG](https://github.com/CERT-Polska/HSN-Capture-HPC-NG) 243 | - [Capture-HPC](https://projects.honeynet.org/capture-hpc) - High interaction client honeypot (also called honeyclient). 244 | - [HoneyBOT](http://www.atomicsoftwaresolutions.com/) 245 | - [HoneyC](https://projects.honeynet.org/honeyc) 246 | - [HoneySpider Network](https://github.com/CERT-Polska/hsn2-bundle) - Highly-scalable system integrating multiple client honeypots to detect malicious websites. 247 | - [HoneyWeb](https://code.google.com/archive/p/gsoc-honeyweb/) - Web interface created to manage and remotely share Honeyclients resources. 248 | - [Jsunpack-n](https://github.com/urule99/jsunpack-n) 249 | - [MonkeySpider](http://monkeyspider.sourceforge.net) 250 | - [PhoneyC](https://github.com/honeynet/phoneyc) - Python honeyclient (later replaced by Thug). 251 | - [Pwnypot](https://github.com/shjalayeri/pwnypot) - High Interaction Client Honeypot. 252 | - [Rumal](https://github.com/thugs-rumal/) - Thug's Rumāl: a Thug's dress and weapon. 253 | - [Shelia](https://www.cs.vu.nl/~herbertb/misc/shelia/) - Client-side honeypot for attack detection. 254 | - [Thug](https://buffer.github.io/thug/) - Python-based low-interaction honeyclient. 255 | - [Thug Distributed Task Queuing](https://thug-distributed.readthedocs.io/en/latest/index.html) 256 | - [Trigona](https://www.honeynet.org/project/Trigona) 257 | - [URLQuery](https://urlquery.net/) 258 | - [YALIH (Yet Another Low Interaction Honeyclient)](https://github.com/Masood-M/yalih) - Low-interaction client honeypot designed to detect malicious websites through signature, anomaly, and pattern matching techniques. 259 | 260 | - Honeypot 261 | - [Deception Toolkit](http://www.all.net/dtk/dtk.html) 262 | - [IMHoneypot](https://github.com/mushorg/imhoneypot) 263 | 264 | - PDF document inspector 265 | - [peepdf](https://github.com/jesparza/peepdf) - Powerful Python tool to analyze PDF documents. 266 | 267 | - Hybrid low/high interaction honeypot 268 | - [HoneyBrid](http://honeybrid.sourceforge.net) 269 | 270 | - SSH Honeypots 271 | - [Blacknet](https://github.com/morian/blacknet) - Multi-head SSH honeypot system. 272 | - [Cowrie](https://github.com/cowrie/cowrie) - Cowrie SSH Honeypot (based on kippo). 273 | - [DShield docker](https://github.com/xme/dshield-docker) - Docker container running cowrie with DShield output enabled. 274 | - [HonSSH](https://github.com/tnich/honssh) - Logs all SSH communications between a client and server. 275 | - [HUDINX](https://github.com/Cryptix720/HUDINX) - Tiny interaction SSH honeypot engineered in Python to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker. 276 | - [Kippo](https://github.com/desaster/kippo) - Medium interaction SSH honeypot. 277 | - [Kippo_JunOS](https://github.com/gregcmartin/Kippo_JunOS) - Kippo configured to be a backdoored netscreen. 278 | - [Kojoney2](https://github.com/madirish/kojoney2) - Low interaction SSH honeypot written in Python and based on Kojoney by Jose Antonio Coret. 279 | - [Kojoney](http://kojoney.sourceforge.net/) - Python-based Low interaction honeypot that emulates an SSH server implemented with Twisted Conch. 280 | - [LongTail Log Analysis @ Marist College](http://longtail.it.marist.edu/honey/) - Analyzed SSH honeypot logs. 281 | - [Malbait](https://github.com/batchmcnulty/Malbait) - Simple TCP/UDP honeypot implemented in Perl. 282 | - [MockSSH](https://github.com/ncouture/MockSSH) - Mock an SSH server and define all commands it supports (Python, Twisted). 283 | - [cowrie2neo](https://github.com/xlfe/cowrie2neo) - Parse cowrie honeypot logs into a neo4j database. 284 | - [go-sshoney](https://github.com/ashmckenzie/go-sshoney) - SSH Honeypot. 285 | - [go0r](https://github.com/fzerorubigd/go0r) - Simple ssh honeypot in Golang. 286 | - [gohoney](https://github.com/PaulMaddox/gohoney) - SSH honeypot written in Go. 287 | - [hived](https://github.com/sahilm/hived) - Golang-based honeypot. 288 | - [hnypots-agent)](https://github.com/joshrendek/hnypots-agent) - SSH Server in Go that logs username and password combinations. 289 | - [honeypot.go](https://github.com/mdp/honeypot.go) - SSH Honeypot written in Go. 290 | - [honeyssh](https://github.com/ppacher/honeyssh) - Credential dumping SSH honeypot with statistics. 291 | - [hornet](https://github.com/czardoz/hornet) - Medium interaction SSH honeypot that supports multiple virtual hosts. 292 | - [ssh-auth-logger](https://github.com/JustinAzoff/ssh-auth-logger) - Low/zero interaction SSH authentication logging honeypot. 293 | - [ssh-honeypot](https://github.com/droberson/ssh-honeypot) - Fake sshd that logs IP addresses, usernames, and passwords. 294 | - [ssh-honeypot](https://github.com/amv42/sshd-honeypot) - Modified version of the OpenSSH deamon that forwards commands to Cowrie where all commands are interpreted and returned. 295 | - [ssh-honeypotd](https://github.com/sjinks/ssh-honeypotd) - Low-interaction SSH honeypot written in C. 296 | - [sshForShits](https://github.com/traetox/sshForShits) - Framework for a high interaction SSH honeypot. 297 | - [sshesame](https://github.com/jaksi/sshesame) - Fake SSH server that lets everyone in and logs their activity. 298 | - [sshhipot](https://github.com/magisterquis/sshhipot) - High-interaction MitM SSH honeypot. 299 | - [sshlowpot](https://github.com/magisterquis/sshlowpot) - Yet another no-frills low-interaction SSH honeypot in Go. 300 | - [sshsyrup](https://github.com/mkishere/sshsyrup) - Simple SSH Honeypot with features to capture terminal activity and upload to asciinema.org. 301 | - [twisted-honeypots](https://github.com/lanjelot/twisted-honeypots) - SSH, FTP and Telnet honeypots based on Twisted. 302 | 303 | - Distributed sensor project 304 | - [DShield Web Honeypot Project](https://sites.google.com/site/webhoneypotsite/) 305 | 306 | - A pcap analyzer 307 | - [Honeysnap](https://projects.honeynet.org/honeysnap/) 308 | 309 | - Network traffic redirector 310 | - [Honeywall](https://projects.honeynet.org/honeywall/) 311 | 312 | - Honeypot Distribution with mixed content 313 | - [HoneyDrive](https://bruteforcelab.com/honeydrive) 314 | 315 | - Honeypot sensor 316 | - [Honeeepi](https://redmine.honeynet.org/projects/honeeepi/wiki) - Honeypot sensor on a Raspberry Pi based on a customized Raspbian OS. 317 | 318 | - File carving 319 | - [TestDisk & PhotoRec](https://www.cgsecurity.org/) 320 | 321 | - Behavioral analysis tool for win32 322 | - [Capture BAT](https://www.honeynet.org/node/315) 323 | 324 | - Live CD 325 | - [DAVIX](https://www.secviz.org/node/89) - The DAVIX Live CD. 326 | 327 | - Spamtrap 328 | - [Mail::SMTP::Honeypot](https://metacpan.org/pod/release/MIKER/Mail-SMTP-Honeypot-0.11/Honeypot.pm) - Perl module that appears to provide the functionality of a standard SMTP server. 329 | - [Mailoney](https://github.com/awhitehatter/mailoney) - SMTP honeypot, Open Relay, Cred Harvester written in python. 330 | - [SendMeSpamIDS.py](https://github.com/johestephan/VerySimpleHoneypot) - Simple SMTP fetch all IDS and analyzer. 331 | - [Shiva](https://github.com/shiva-spampot/shiva) - Spam Honeypot with Intelligent Virtual Analyzer. 332 | - [Shiva The Spam Honeypot Tips And Tricks For Getting It Up And Running](https://www.pentestpartners.com/security-blog/shiva-the-spam-honeypot-tips-and-tricks-for-getting-it-up-and-running/) 333 | - [SpamHAT](https://github.com/miguelraulb/spamhat) - Spam Honeypot Tool. 334 | - [Spamhole](http://www.spamhole.net/) 335 | - [honeypot](https://github.com/jadb/honeypot) - The Project Honey Pot un-official PHP SDK. 336 | - [spamd](http://man.openbsd.org/cgi-bin/man.cgi?query=spamd%26apropos=0%26sektion=0%26manpath=OpenBSD+Current%26arch=i386%26format=html) 337 | 338 | - Commercial honeynet 339 | - [Cymmetria Mazerunner](ttps://cymmetria.com/products/mazerunner/) - Leads attackers away from real targets and creates a footprint of the attack. 340 | 341 | - Server (Bluetooth) 342 | - [Bluepot](https://github.com/andrewmichaelsmith/bluepot) 343 | 344 | - Dynamic analysis of Android apps 345 | - [Droidbox](https://code.google.com/archive/p/droidbox/) 346 | 347 | - Dockerized Low Interaction packaging 348 | - [Docker honeynet](https://github.com/sreinhardt/Docker-Honeynet) - Several Honeynet tools set up for Docker containers. 349 | - [Dockerized Thug](https://hub.docker.com/r/honeynet/thug/) - Dockerized [Thug](https://github.com/buffer/thug) to analyze malicious web content. 350 | - [Dockerpot](https://github.com/mrschyte/dockerpot) - Docker based honeypot. 351 | - [Manuka](https://github.com/andrewmichaelsmith/manuka) - Docker based honeypot (Dionaea and Kippo). 352 | - [honey_ports](https://github.com/run41/honey_ports) - Very simple but effective docker deployed honeypot to detect port scanning in your environment. 353 | - [mhn-core-docker](https://github.com/MattCarothers/mhn-core-docker) - Core elements of the Modern Honey Network implemented in Docker. 354 | 355 | - Network analysis 356 | - [Quechua](https://bitbucket.org/zaccone/quechua) 357 | 358 | - SIP Server 359 | - [Artemnesia VoIP](http://artemisa.sourceforge.net) 360 | 361 | - IOT Honeypot 362 | - [HoneyThing](https://github.com/omererdem/honeything) - TR-069 Honeypot. 363 | - [Kako](https://github.com/darkarnium/kako) - Honeypots for a number of well known and deployed embedded device vulnerabilities. 364 | 365 | - Honeytokens 366 | - [CanaryTokens](https://github.com/thinkst/canarytokens) - Self-hostable honeytoken generator and reporting dashboard; demo version available at [CanaryTokens.org](https://canarytokens.org/generate). 367 | - [Honeybits](https://github.com/0x4D31/honeybits) - Simple tool designed to enhance the effectiveness of your traps by spreading breadcrumbs and honeytokens across your production servers and workstations to lure the attacker toward your honeypots. 368 | - [Honeyλ (HoneyLambda)](https://github.com/0x4D31/honeylambda) - Simple, serverless application designed to create and monitor URL honeytokens, on top of AWS Lambda and Amazon API Gateway. 369 | - [dcept](https://github.com/secureworks/dcept) - Tool for deploying and detecting use of Active Directory honeytokens. 370 | - [honeyku](https://github.com/0x4D31/honeyku) - Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens). 371 | 372 | ## Honeyd Tools 373 | 374 | - Honeyd plugin 375 | - [Honeycomb](http://www.honeyd.org/tools.php) 376 | 377 | - Honeyd viewer 378 | - [Honeyview](http://honeyview.sourceforge.net/) 379 | 380 | - Honeyd to MySQL connector 381 | - [Honeyd2MySQL](https://bruteforcelab.com/honeyd2mysql) 382 | 383 | - A script to visualize statistics from honeyd 384 | - [Honeyd-Viz](https://bruteforcelab.com/honeyd-viz) 385 | 386 | - Honeyd stats 387 | - [Honeydsum.pl](https://github.com/DataSoft/Honeyd/blob/master/scripts/misc/honeydsum-v0.3/honeydsum.pl) 388 | 389 | 390 | 391 | ## Network and Artifact Analysis 392 | 393 | - Sandbox 394 | - [Argos](http://www.few.vu.nl/argos/) - Emulator for capturing zero-day attacks. 395 | - [COMODO automated sandbox](https://help.comodo.com/topic-72-1-451-4768-.html) 396 | - [Cuckoo](https://cuckoosandbox.org/) - Leading open source automated malware analysis system. 397 | - [Pylibemu](https://github.com/buffer/pylibemu) - Libemu Cython wrapper. 398 | - [RFISandbox](https://monkey.org/~jose/software/rfi-sandbox/) - PHP 5.x script sandbox built on top of [funcall](https://pecl.php.net/package/funcall). 399 | - [dorothy2](https://github.com/m4rco-/dorothy2) - Malware/botnet analysis framework written in Ruby. 400 | - [imalse](https://github.com/hbhzwj/imalse) - Integrated MALware Simulator and Emulator. 401 | - [libemu](https://github.com/buffer/libemu) - Shellcode emulation library, useful for shellcode detection. 402 | 403 | 404 | - Sandbox-as-a-Service 405 | - [Hybrid Analysis](https://www.hybrid-analysis.com) - Free malware analysis service powered by Payload Security that detects and analyzes unknown threats using a unique Hybrid Analysis technology. 406 | - [Joebox Cloud](https://jbxcloud.joesecurity.org/login) - Analyzes the behavior of malicious files including PEs, PDFs, DOCs, PPTs, XLSs, APKs, URLs and MachOs on Windows, Android and Mac OS X for suspicious activities. 407 | - [VirusTotal](https://www.virustotal.com/) - Analyze suspicious files and URLs to detect types of malware, and automatically share them with the security community. 408 | - [malwr.com](https://malwr.com/) - Free malware analysis service and community. 409 | 410 | ## Data Tools 411 | 412 | - Front Ends 413 | - [DionaeaFR](https://github.com/rubenespadas/DionaeaFR) - Front Web to Dionaea low-interaction honeypot. 414 | - [Django-kippo](https://github.com/jedie/django-kippo) - Django App for kippo SSH Honeypot. 415 | - [Shockpot-Frontend](https://github.com/GovCERT-CZ/Shockpot-Frontend) - Full featured script to visualize statistics from a Shockpot honeypot. 416 | - [Tango](https://github.com/aplura/Tango) - Honeypot Intelligence with Splunk. 417 | - [Wordpot-Frontend](https://github.com/GovCERT-CZ/Wordpot-Frontend) - Full featured script to visualize statistics from a Wordpot honeypot. 418 | - [honeyalarmg2](https://github.com/schmalle/honeyalarmg2) - Simplified UI for showing honeypot alarms. 419 | - [honeypotDisplay](https://github.com/Joss-Steward/honeypotDisplay) - Flask website which displays data gathered from an SSH Honeypot. 420 | 421 | - Visualization 422 | - [Acapulco](https://github.com/hgascon/acapulco) - Automated Attack Community Graph Construction. 423 | - [Afterglow Cloud](https://github.com/ayrus/afterglow-cloud) 424 | - [Afterglow](http://afterglow.sourceforge.net/) 425 | - [Glastopf Analytics](https://github.com/katkad/Glastopf-Analytics) - Easy honeypot statistics. 426 | - [HoneyMalt](https://github.com/SneakersInc/HoneyMalt) - Maltego tranforms for mapping Honeypot systems. 427 | - [HoneyMap](https://github.com/fw42/honeymap) - Real-time websocket stream of GPS events on a fancy SVG world map. 428 | - [HoneyStats](https://sourceforge.net/projects/honeystats/) - Statistical view of the recorded activity on a Honeynet. 429 | - [HpfeedsHoneyGraph](https://github.com/yuchincheng/HpfeedsHoneyGraph) - Visualization app to visualize hpfeeds logs. 430 | - [Kippo stats](https://github.com/mfontani/kippo-stats) - Mojolicious app to display statistics for your kippo SSH honeypot. 431 | - [Kippo-Graph](https://bruteforcelab.com/kippo-graph) - Full featured script to visualize statistics from a Kippo SSH honeypot. 432 | - [The Intelligent HoneyNet](https://github.com/jpyorre/IntelligentHoneyNet) - Create actionable information from honeypots. 433 | - [ovizart](https://github.com/oguzy/ovizart) - Visual analysis for network traffic. 434 | 435 | ## Guides 436 | 437 | - [T-Pot: A Multi-Honeypot Platform](https://dtag-dev-sec.github.io/mediator/feature/2015/03/17/concept.html) 438 | - [Honeypot (Dionaea and kippo) setup script](https://github.com/andrewmichaelsmith/honeypot-setup-script/) 439 | 440 | - Deployment 441 | - [Dionaea and EC2 in 20 Minutes](http://andrewmichaelsmith.com/2012/03/dionaea-honeypot-on-ec2-in-20-minutes/) - Tutorial on setting up Dionaea on an EC2 instance. 442 | - [Using a Raspberry Pi honeypot to contribute data to DShield/ISC](https://isc.sans.edu/diary/22680) - The Raspberry Pi based system will allow us to maintain one code base that will make it easier to collect rich logs beyond firewall logs. 443 | - [honeypotpi](https://github.com/free5ty1e/honeypotpi) - Script for turning a Raspberry Pi into a HoneyPot Pi. 444 | 445 | - Research Papers 446 | - [Honeypot research papers](https://github.com/shbhmsingh72/Honeypot-Research-Papers) - PDFs of research papers on honeypots. 447 | - [vEYE](https://link.springer.com/article/10.1007%2Fs10115-008-0137-3) - Behavioral footprinting for self-propagating worm detection and profiling. 448 | --------------------------------------------------------------------------------