There are 5 repositories under honeypots topic.
Tutorial on how to create your own honeypot erc20/ bep20 tokens and listing to Uniswap
THE ESP8266 HONEYPOT
tutorial on how to create honeypot token
an awesome list of active defense resources
Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).
This repo collects almost all the smart contract honeypots that you could find in the first three pages of Google search.
Signature based honeypot detector tool written in Golang
Automation tool for Windows Deception Host Burn-In
Simple ESP8266 / ESP32 Canary that simulates predefined application server and notifies you using E-mail, Telegram, etc if it was accessed.
How to create honeypot token ? Step by step guide and learn how to list them into dex exchanges.
Capture passwords of login attempts on non-existent and disabled accounts.
⚱️ 💊 🔐 #1st Time On Internet - Check If Token is honeypot or not 🥇
The Attacker IP Prioritizer(AIP) dynamically generates resource-friendly IPv4 blocklists from Zeek network flows.
Highly customizable low-interaction experimental honeypot that mimics specific hosts.
Honeyscanner: A vulnerability analyzer for honeypots
An awesome list of honeypot resources. With repository stars⭐ and forks🍴
collect logs and alerts from 27 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.
HoneyDB Python Module
:honey_pot: New Honeypot Version: 1.2! :honeybee: This pH7CMS module is a simple but effective honeypot fake Admin CP for the security of your website. Honeypot for the attackers!
🍯 pH7CMS Modula to setup a honeypot fake Admin CP to secure your social/dating site. Basically it's a honeypot for the attackers/hackers and track their behaviour!
An SSH honeypot written entirely in Go.
Step By Step Guide on How to create a Honeypot Token.
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Honey Pots in Cybersecurity.
Phenomenon from Blockchain Cryptocurrency Solidity Vulnerable Honeypots
SaaS Platform for Identification & Curtailment of Honeypots in Ethereum-based Smart Contracts using Machine Learning and Code Analysis
Crypto Honeypot: A Comprehensive Guide to Create, Deploy and Market Your Own Cryptocurrency Token
A structured list of honeypots software that allows quickly searches.
HoneyPot A good way to capture hackers is to get them ip | Ruby Script
Slow the bot's by spoofing what they are looking for!