Skip to content

not-official/honeypot-python-fastapi

Repository files navigation

Steps to run (Please go thorough the installation steps) You will require two terminal to simulate the server and the attacker.

At server side python run-honeypot.py

At attacker side ssh -p 2222 localhost

Clone the repo and follow these steps INSTALLATION STEPS

  1. Install the requirements pip install -r requirements.txt
  2. Setup the LLM key in .env file for eg: GOOGLE_API_KEY="AIza*******"

Terminogies regarding the project Asynchronous event-driven networking SSH protocol emulation Credential harvesting Interactive shell simulation Virtualized filesystem abstraction Persistent JSON Lines logging Thread-safe log writing Session isolation Command parsing and tokenization PowerShell-style output formatting CRLF newline normalization Host key management (RSA) Decoy authentication Attack surface reduction Behavioral telemetry collection Honeypot deception techniques Adversarial engagement Network service sandboxing Containerization (Docker support) Python concurrency (asyncio) Dynamic prompt rendering Artifact persistence Forensic data enrichment Remote attacker profiling Event-driven command dispatch Secure append-only logging Automated threat intelligence gathering

ssh -p 2222 localhost

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors