Projects

Projects

This page contains a list of tools and services that we use on a regular basis. Most of these tools have been created by our members and participating GSoc students, but some are also external and not affiliated with the Honeynet Project. We hope you find the below link collection useful. If you see that a specific tool is not listed, but should, feel free to email [email protected]

Active Projects

Dockpot – high interaction SSH honeypot

What is dockpot? Dockpot is a high interaction SSH honeypot based on Docker. It's basically a NAT device that has the ...
Read More

Conpot – Low interaction server side ICS honeypot

About Conpot Conpot is a low interactive server side Industrial Control Systems honeypot designed to be easy to deploy, modify ...
Read More

Droidbox – Android Application Sandbox

Droidbox is a dynamic analysis platform for android applications. Droidbox was developed by Patrik Lantz as part of GSoc 2011 ...
Read More

Dionaea – Catching bugs

Dionaea is a low-interaction honeypot that captures attack payloads and malware. Dionaea is meant to be a nepenthes successor, embedding ...
Read More

Old Projects

Capture BAT

Capture BAT is a behavioral analysis tool of applications for the Win32 operating system family. Capture BAT is able to ...
Read More

Honeysnap

Honeysnap is a tool used for extracting and analyzing data from pcap files, including IRC communications. Developed and maintained by ...
Read More

Honeystick

Honeystick is a bootable Honeynet from a USB device. It includes both the Honeywall and honeypots from a single, portable ...
Read More

Google Hack Honeypot

Google Hack Honeypot is the reaction to a new type of malicious web traffic: search engine hackers. It is designed ...
Read More

HoneyC

HoneyC is a low interaction client honeypot framework that allows to find malicious servers on a network. Instead of using ...
Read More

Capture-HPC

Capture is a high interaction client honeypot (also called honeyclient). A client honeypot or honeyclient is a security technology that allows one to find malicious servers ...
Read More