Science Score: 44.0%
This score indicates how likely this project is to be science-related based on various indicators:
-
✓CITATION.cff file
Found CITATION.cff file -
✓codemeta.json file
Found codemeta.json file -
✓.zenodo.json file
Found .zenodo.json file -
○DOI references
-
○Academic publication links
-
○Academic email domains
-
○Institutional organization owner
-
○JOSS paper metadata
-
○Scientific vocabulary similarity
Low similarity (11.0%) to scientific vocabulary
Repository
Easy to configure Honeypot for Blue Team
Basic Info
- Host: GitHub
- Owner: pbssubhash
- License: apache-2.0
- Language: HTML
- Default Branch: main
- Size: 10 MB
Statistics
- Stars: 41
- Watchers: 4
- Forks: 7
- Open Issues: 0
- Releases: 0
Metadata Files
README.md

Adjusted for T-Pot
This fork of h0neytr4p was revised for T-Pot with the following features:
- Add Docker support (Dockerfile, docker-compose.yml)
- Use a single logfile instead of two
- Log to JSON instead of CSV
- Enrich JSON log file with additional info (i.e. Cookies, Headers, Destination Port, etc.)
- Improve trap support on multiple / different ports
- Add payload handler (store payloads in payload folder) with pre-defined sizeLimit(s)
Original h0neytr4p work by
Authors:
Rule Contributors:
What is h0neytr4p?
Honeytrap (a.k.a h0neytr4p) is an easy to configure, deploy honeypot for protecting against web recon and exploiting.
How does it work?
Blue teams can create trap for each vulnerability or exploit or recon technique and place it in the /traps folder and restart h0neytr4p. This will automatically reload the configuration and start the h0neytr4p.
What does it protect against?
h0neytr4p was primarly built to remove the pain of creating a vulnerable application for publicly facing honeypots. While there's no denying the fact that creating an end to end vulnerable application might have it's own advantages, we need something flexible, agile framework for trapping the notorious bad guys. Some of the common use-cases are: - Let's say you received an advisory that some XXX group is targetting a web RCE 1day and you want to detect the exploitation or recon attempts, you are at the right place. - You want to know who's scanning your external attack surface using the new cutting edge tools like nuclei or nmap? this tool got it covered.
Run with docker
``` git clone https://github.com/t3chn0m4g3/h0neytr4p cd h0neytr4p docker compose build docker compose up
/$$ /$$$$$$ /$$ /$$ /$$ | $$ /$$$_ $$ | $$ | $$ | $$ | $$$$$$$ | $$$$\ $$ /$$$$$$$ /$$$$$$ /$$ /$$ /$$$$$$ /$$$$$$ | $$ | $$ /$$$$$$ | $$__ $$| $$ $$ $$| $$__ $$ /$$__ $$| $$ | $$|_ $$/ /$$_ $$| $$$$$$$$ /$$__ $$ | $$ \ $$| $$\ $$$$| $$ \ $$| $$$$$$$$| $$ | $$ | $$ | $$ _/|____ $$| $$ \ $$ | $$ | $$| $$ \ $$$| $$ | $$| $$____/| $$ | $$ | $$ /$$| $$ | $$| $$ | $$ | $$ | $$| $$$$$$/| $$ | $$| $$$$$$$| $$$$$$$ | $$$$/| $$ | $$| $$$$$$$/ |/ |/ ____/ |/ |/ ___/ _ $$ _/ |/ |/| $$/ /$$ | $$ | $$ | $$$$$$/ [ v0.3 ] | $$ ___/ |_/ Built by a Red team, with <3 Built by zer0p1k4chu & g0dsky (https://github.com/pbssubhash/h0neytr4p) Adjusted for T-Pot by t3chn0m4g3 (https://github.com/t3chn0m4g3/h0neytr4p)
[ Traps folder ] -> [ traps/ ] [ Logfile ] -> [ log/log.json ] [ Payloads folder ] -> [ /opt/h0neytr4p/payloads/ ] [ Catch all payloads ] -> [ false ] [ Payload multipart limit ] -> [ 103424 ] [ Payload other limit ] -> [ 11264 ]
Logging is configured and ready. Payload folder is configured and ready. [~>] Loaded 31 traps on Port:443. Let's get the ball rolling! ```
Owner
- Name: pbssubhash
- Login: pbssubhash
- Kind: user
- Company: Microsoft
- Repositories: 33
- Profile: https://github.com/pbssubhash
Security Researcher making cyber security a much safer place.
Citation (CITATION.cff)
cff-version: 1.2.0
title: >-
h0neytr4p: Easy to configure Honeypot for Blue Team
message: 'If you use this software, please cite it as below.'
type: software
authors:
- given-names: Subhash
family-names: Popuri
twitter: https://twitter.com/pbssubhash
- given-names: Aakash
family-names: Madaan
twitter: https://twitter.com/me_godsky
GitHub Events
Total
- Issues event: 4
- Watch event: 2
- Push event: 1
- Fork event: 2
Last Year
- Issues event: 4
- Watch event: 2
- Push event: 1
- Fork event: 2
Dependencies
- github.com/pbssubhash/h0neytr4p v0.0.0-00010101000000-000000000000
- github.com/ryanuber/go-glob v1.0.0
- github.com/gorilla/mux v1.8.0
- github.com/ryanuber/go-glob v1.0.0
- github.com/gorilla/mux v1.8.0
- github.com/gorilla/mux v1.8.0