mirror of
https://github.com/telekom-security/tpotce.git
synced 2025-07-03 05:22:11 +00:00
Update README.md
This commit is contained in:
parent
a7b53f1d7d
commit
bd963e48c2
1 changed files with 18 additions and 18 deletions
36
README.md
36
README.md
|
@ -45,37 +45,37 @@ The core components of T-Pot have been moved into a Docker image called **tpotin
|
||||||
T-Pot supports a wide range of honeypots, including:
|
T-Pot supports a wide range of honeypots, including:
|
||||||
|
|
||||||
#### 1.3.1 Industrial and Medical Honeypots 🏭
|
#### 1.3.1 Industrial and Medical Honeypots 🏭
|
||||||
1. **Conpot**: Simulates Industrial Control Systems (ICS) and protocols like Modbus, SNMP, and S7comm.
|
1. **[Conpot](http://conpot.org/)**: Simulates Industrial Control Systems (ICS) and protocols like Modbus, SNMP, and S7comm.
|
||||||
2. **Dicompot**: Emulates medical imaging systems (DICOM) to detect attacks on medical devices.
|
2. **[Dicompot](https://github.com/nsmfoo/dicompot)**: Emulates medical imaging systems (DICOM) to detect attacks on medical devices.
|
||||||
3. **Medpot**: Simulates medical data management systems, focusing on healthcare sector attacks.
|
3. **Medpot**: Simulates medical data management systems, focusing on healthcare sector attacks.
|
||||||
|
|
||||||
#### 1.3.2 Network and IoT Honeypots 🌐
|
#### 1.3.2 Network and IoT Honeypots 🌐
|
||||||
1. **Adbhoney**: Simulates Android devices exposed via the ADB (Android Debug Bridge) protocol.
|
1. **[Adbhoney](https://github.com/huuck/ADBHoney)**: Simulates Android devices exposed via the ADB (Android Debug Bridge) protocol.
|
||||||
2. **Ciscoasa**: Emulates Cisco ASA devices to detect attacks on firewalls and VPNs.
|
2. **[Ciscoasa](https://github.com/Cymmetria/ciscoasa_honeypot)**: Emulates Cisco ASA devices to detect attacks on firewalls and VPNs.
|
||||||
3. **Citrixhoneypot**: Simulates known Citrix vulnerabilities, such as CVE-2019-19781.
|
3. **[Citrixhoneypot](https://github.com/MalwareTech/CitrixHoneypot)**: Simulates known Citrix vulnerabilities, such as CVE-2019-19781.
|
||||||
4. **Dionaea**: Emulates vulnerable network services (e.g., SMB, FTP) to capture malware and exploits.
|
4. **[Dionaea](https://github.com/DinoTools/dionaea)**: Emulates vulnerable network services (e.g., SMB, FTP) to capture malware and exploits.
|
||||||
5. **Endlessh**: Simulates an SSH server that keeps connections open indefinitely, slowing down network scanners.
|
5. **[Endlessh](https://github.com/skeeto/endlessh)**: Simulates an SSH server that keeps connections open indefinitely, slowing down network scanners.
|
||||||
6. **Ipphoney**: Emulates IPP (Internet Printing Protocol) services to detect attacks on network printers.
|
6. **[Ipphoney](https://gitlab.com/bontchev/ipphoney)**: Emulates IPP (Internet Printing Protocol) services to detect attacks on network printers.
|
||||||
|
|
||||||
#### 1.3.3 Web and Application Honeypots 🌍
|
#### 1.3.3 Web and Application Honeypots 🌍
|
||||||
1. **Cowrie**: Emulates SSH and Telnet servers to capture brute-force attempts and malicious commands.
|
1. **[Cowrie](https://github.com/cowrie/cowrie)**: Emulates SSH and Telnet servers to capture brute-force attempts and malicious commands.
|
||||||
2. **Hellpot**: Simulates vulnerable HTTP servers to capture "log4shell" attacks (CVE-2021-44228).
|
2. **[Hellpot](https://github.com/yunginnanet/HellPot)**: Simulates vulnerable HTTP servers to capture "log4shell" attacks (CVE-2021-44228).
|
||||||
|
|
||||||
#### 1.3.4 DDoS and Anomaly Detection Honeypots ⚠️
|
#### 1.3.4 DDoS and Anomaly Detection Honeypots ⚠️
|
||||||
1. **Ddospot**: Detects and analyzes DDoS attacks by simulating vulnerable services.
|
1. **[Ddospot](https://github.com/aelth/ddospot)**: Detects and analyzes DDoS attacks by simulating vulnerable services.
|
||||||
2. **Honeytrap**: Monitors network traffic and dynamically launches honeypots based on incoming requests.
|
2. **[Honeytrap](https://github.com/armedpot/honeytrap/)**: Monitors network traffic and dynamically launches honeypots based on incoming requests.
|
||||||
|
|
||||||
#### 1.3.5 Email and Communication Honeypots 📧
|
#### 1.3.5 Email and Communication Honeypots 📧
|
||||||
1. **Mailoney**: Emulates SMTP servers to capture spam and phishing attempts.
|
1. **[Mailoney](https://github.com/awhitehatter/mailoney)**: Emulates SMTP servers to capture spam and phishing attempts.
|
||||||
2. **Heralding**: Simulates authentication services (e.g., SSH, FTP) to capture stolen credentials.
|
2. **[Heralding](https://github.com/johnnykv/heralding)**: Simulates authentication services (e.g., SSH, FTP) to capture stolen credentials.
|
||||||
|
|
||||||
#### 1.3.6 Malware and Advanced Analysis Honeypots 🦠
|
#### 1.3.6 Malware and Advanced Analysis Honeypots 🦠
|
||||||
1. **Beelzebub**: Analyzes malware by emulating vulnerable services.
|
1. **[Beelzebub](https://github.com/mariocandela/beelzebub)**: Analyzes malware by emulating vulnerable services.
|
||||||
2. **Snare / Tanner**: Snare captures interactions, while Tanner analyzes attacker behavior.
|
2. Snare / Tanner: Snare captures interactions, while Tanner analyzes attacker behavior.
|
||||||
|
|
||||||
#### 1.3.7 Data Traps and Advanced Deception Honeypots 🎯
|
#### 1.3.7 Data Traps and Advanced Deception Honeypots 🎯
|
||||||
1. **Elasticpot**: Simulates an unprotected Elasticsearch server, often targeted for data breaches.
|
1. **[Elasticpot](https://gitlab.com/bontchev/elasticpot)**: Simulates an unprotected Elasticsearch server, often targeted for data breaches.
|
||||||
2. **H0neytr4p**: A generic honeypot for capturing interactions with exposed services.
|
2. **[H0neytr4p](https://github.com/pbssubhash/h0neytr4p)**: A generic honeypot for capturing interactions with exposed services.
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue