mirror of
https://github.com/sbilly/awesome-security
synced 2024-11-22 19:33:05 +00:00
Merge pull request #22 from foospidy/master
Adding HoneyPy to honepot list, thanks to @foospidy
This commit is contained in:
commit
d5f193f09f
1 changed files with 1 additions and 0 deletions
|
@ -66,6 +66,7 @@ Thanks to all [contributors](https://github.com/sbilly/awesome-security/graphs/c
|
|||
|
||||
### Honey Pot / Honey Net
|
||||
|
||||
- [HoneyPy](https://github.com/foospidy.com/HoneyPy) - HoneyPy is a low to medium interaction honeypot. It is intended to be easy to: deploy, extend functionality with plugins, and apply custom configurations.
|
||||
- [Dionaea](http://dionaea.carnivore.it/) - Dionaea is meant to be a nepenthes successor, embedding python as scripting language, using libemu to detect shellcodes, supporting ipv6 and tls.
|
||||
- [Conpot](http://conpot.org/) - ICS/SCADA Honeypot. Conpot is a low interactive server side Industrial Control Systems honeypot designed to be easy to deploy, modify and extend. By providing a range of common industrial control protocols we created the basics to build your own system, capable to emulate complex infrastructures to convince an adversary that he just found a huge industrial complex. To improve the deceptive capabilities, we also provided the possibility to server a custom human machine interface to increase the honeypots attack surface. The response times of the services can be artificially delayed to mimic the behaviour of a system under constant load. Because we are providing complete stacks of the protocols, Conpot can be accessed with productive HMI's or extended with real hardware. Conpot is developed under the umbrella of the Honeynet Project and on the shoulders of a couple of very big giants.
|
||||
- [Amun](https://github.com/zeroq/amun) - Amun Python-based low-interaction Honeypot.
|
||||
|
|
Loading…
Reference in a new issue