Generally, agencies crack messages or seize an already available encrypted communication platform to keep track of cybercriminals. Two such examples would be...
HosTaGe is a lightweight, low-interaction, portable, and generic honeypot for mobile devices that aims on the detection of malicious, wireless network...
snare – Super Next generation Advanced Reactive honEypot Super Next generation Advanced Reactive honEypot About SNARE is a web application honeypot...
Honeypot creates a safe environment to capture and interact with unsolicited and often malicious traffic on a network. HoneyBOT is an easy...
Network breaches happen. From mega-corps, to governments. From unsuspecting grandmas to well known security pros. This is (kinda) excusable. What isn’t excusable,...
Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by...
T-Pot is based on debian. The honeypot daemons as well as other support components being used have been paravirtualized using docker. This...
Nowdays internal & external networks are not secure, explain ethical hacking researchers. That’s why various security policies are implemented on networking level...
A low interaction honeypot with the capability to be more of a medium interaction honeypot. HoneyPy is written in Python2 and is...
T-Pot is based on Ubuntu Server 16.10 LTS. The honeypot daemons as well as other support components being used have been paravirtualized using...
Bluepot was a third year university project attempting to implement a fully functional Bluetooth Honeypot. A piece of software designed to accept...
As well as doing training, challenges and shadowing engagements, MWR interns conduct research projects into a range of areas. The purpose of this...
This project implements a python telnet server trying to act as a honeypot for IoT Malware which spreads over horribly insecure default...
HoneyDrive is a Xubuntu-based open-source and premier honeypot bundle Linux operating system. It is a pre-configured honeypot system in a virtual hard disk drive (VMDK...
It is astonishingly easy as an attacker to move around on most networks undetected. Let’s face it, unless your organization is big...
The WannaCry ransomware — also known as WCry, Wana Decrypt0r, WannaCrypt, and WanaCrypt0r — infected a honeypot server made to look like...
Tor is a free software that is widely used by people to protect their identity and avoid network surveillance. The Onion Router...