Projects

Projects

This page contains a list of tools and services that we use on a regular basis. Most of these tools have been created by our members and participating GSoc students, but some are also external and not affiliated with the Honeynet Project. We hope you find the below link collection useful. If you see that a specific tool is not listed, but should, feel free to email [email protected]

Active Projects

Thug

The number of client-side attacks has grown significantly in the past few years shifting focus on poorly protected vulnerable clients ...
Read More

T-POT

The All In One Honeypot Platform. T-POT is a honeypot system that is easy to deploy, has low maintenance and ...
Read More

Mitmproxy

Mitmproxy is your swiss-army knife for debugging, testing, privacy measurements, and penetration testing. It can be used to intercept, inspect, ...
Read More

Snare and Tanner

Snare SNARE is a web application honeypot sensor attracting all sort of maliciousness from the Internet. Check the project on ...
Read More

Intel Owl

Intel Owl is an Open Source Intelligence, or OSINT solution to get threat intelligence data about a specific file, an ...
Read More

Glutton

Generic Low Interaction Honeypot Check the project on Github ...
Read More

Old Projects

Kippo

Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction ...
Read More

GVol

About GVol GVol is a lightweight GUI application built in Java designed to automate the usage of volatility toolkit for ...
Read More

HoneySink

Sinkholing is one technique that allows security researchers/responders the ability to monitor botnets, as well as proactively deny access to ...
Read More

APKinspector

APKinspector is a static analysis platform for android applications. Think of it as IDAPro for android applications. The video at ...
Read More

HFlow2

What is Hflow2 Hflow2 is a data coalesing tool for honeynet/network analysis. It allows to coalesce data from snort, p0f, sebekd ...
Read More

Glastopf

About Glastopf Web sites are hacked all the time. Web application, database, and cross-site scripting vulnerabilities expose a large attack ...
Read More
Loading...