T-Pot is an All-In-One Multi Honeypot Platform, supporting 20+ honeypots and countless visualisation options using the Elastic Stack, animated live attack maps and lots of security tools to further improve the deception experience.
Meet the system requirements. The T-Pot installation needs at least 8-16 GB RAM and 128 GB free disk space as well as a working (outgoing non-filtered) internet connection.
T-Pot offers docker images for the following honeypots:
Mailoney - SMTP honeypot, Open Relay, Cred Harvester written in python.
Conpot - An ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems.
Android Debug Bridge over TCP/IP - Low interaction honeypot that simulates an Android device running Android Debug Bridge (ADB) server process.
Dionaea - A nepenthes successor, embedding python as scripting language, using libemu to detect shellcodes, supporting ipv6 and tls.
Cisco ASA honeypot - A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.
DDoSPot - NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot.
Honeypots - 25 different honeypots in a single pypi package! (dns, ftp, httpproxy, http, https, imap, mysql, pop3, postgres, redis, smb, smtp, socks5, ssh, telnet, vnc, mssql, elastic, ldap, ntp, memcache, snmp, oracle, sip and irc).
Honeytrap - Advanced Honeypot framework written in Go that can be connected with other honeypot software.
IPP Honey - A honeypot for the Internet Printing Protocol.
SentryPeer - A fraud detection tool which lets bad actors try to make phone calls and saves the IP address they came from and number they tried to call.