main b2a194f8fccd cached
20 files
15.4 KB
5.4k tokens
1 requests
Download .txt
Repository: UnaPibaGeek/honeypots-detection
Branch: main
Commit: b2a194f8fccd
Files: 20
Total size: 15.4 KB

Directory structure:
gitextract_juuft8tj/

├── .gitignore
├── LICENSE
├── README.md
└── templates/
    ├── adbhoney-detection-cnxn.yaml
    ├── adbhoney-detection-shell.yaml
    ├── cisco-asa-honeypot-detection.yaml
    ├── citrix-honeypot-detection.yaml
    ├── conpot-siemens-honeypot-detection.yaml
    ├── cowrie-ssh-honeypot-detection.yaml
    ├── dionaea-ftp-honeypot-detection.yaml
    ├── dionaea-http-honeypot-detection.yaml
    ├── dionaea-mongodb-honeypot-detection.yaml
    ├── dionaea-mqtt-honeypot-detection.yaml
    ├── dionaea-mysql-honeypot-detect.yaml
    ├── dionaea-smb-honeypot-detection.yaml
    ├── elasticpot-honeypot-detection.yaml
    ├── gaspot-honeypot-detection.yaml
    ├── mailoney-honeypot-detection.yaml
    ├── redis-honeypot-detection.yaml
    └── snare-honeypot-detection.yaml

================================================
FILE CONTENTS
================================================

================================================
FILE: .gitignore
================================================
.DS_Store


================================================
FILE: LICENSE
================================================
MIT License

Copyright (c) 2023 Sheila A. Berta

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.


================================================
FILE: README.md
================================================
# Honeypots Detection
Nuclei templates for honeypots detection.

This repository contains Nuclei templates to detect several well-known open-source honeypots, such as: ADBHoney, Conpot, Cowrie, Dionaea (multiple services), ElasticPot, Mailoney, Redis Honeypot, Snare, among others.

## Usage

1. Install Nuclei (https://github.com/projectdiscovery/nuclei#install-nuclei).
2. Clone this repository:  
   `git clone https://github.com/UnaPibaGeek/honeypots-detection.git`
3. Move into the templates folder:  
   `cd honeypots-detection/templates`
4. Run the desired template as follows:  
   `sudo nuclei -u {target_IP} -t ./{template_name}.yaml`

## Example

![example](https://github.com/UnaPibaGeek/honeypots-detection/blob/main/examples/example.png)

For a more detailed output it is possible to use the `-debug-resp` parameter:

![example_debug](https://github.com/UnaPibaGeek/honeypots-detection/blob/main/examples/example_debug.png)

The requests will be sent to the honeypot's default port if not specified.

## Acknowledgements
- Thank you [Project Discovery](https://github.com/projectdiscovery/nuclei) for such a great tool and contribution to our community.
- These templates were developed while researching honeypots at [Dreamlab Technologies](www.dreamlab.net) for [CYOBS](www.cyobs.com).

Made with ❤️ by [UnaPibaGeek](https://www.twitter.com/UnaPibaGeek).


================================================
FILE: templates/adbhoney-detection-cnxn.yaml
================================================
id: adbhoney-honeypot-detection

info:
  name: ADBHoney Honeypot Detection
  author: UnaPibaGeek
  severity: info
  description: |
    ADBHoney honeypot has been identified.
    The response to the 'adb connect' command differs from real installations, signaling a possible deceptive setup.
  metadata:
    max-request: 4
    vendor: android
    product: adb
  tags: adbhoney,android,adb,honeypot

tcp:
  - host:
      - "{{Hostname}}"
      - "{{Host}}:5555"
    inputs:
      - data: "434e584e0100000100001000ea000000445b0000bcb1a7b1" # CNXN
        type: hex
      - data: "686f73743a3a66656174757265733d7368656c6c5f76322c636d642c737461745f76322c6c735f76322c66697865645f707573685f6d6b6469722c617065782c6162622c66697865645f707573685f73796d6c696e6b5f74696d657374616d702c6162625f657865632c72656d6f756e745f7368656c6c2c747261636b5f6170702c73656e64726563765f76322c73656e64726563765f76325f62726f746c692c73656e64726563765f76325f6c7a342c73656e64726563765f76325f7a7374642c73656e64726563765f76325f6472795f72756e5f73656e642c6f70656e73637265656e5f6d646e73" # CLIENT INFO
        type: hex

    read-size: 1024
    matchers:
      - type: word
        words:
          - "device::http://ro.product.name =starltexx;ro.product.model=SM-G960F"


================================================
FILE: templates/adbhoney-detection-shell.yaml
================================================
id: adbhoney-honeypot-detection-shell

info:
  name: ADBHoney Honeypot Detection (shell probe)
  author: UnaPibaGeek
  severity: info
  description: |
    ADBHoney honeypot has been identified.
    The response to the 'adb shell pwd' command differs from real installations, signaling a possible deceptive setup.
  metadata:
    max-request: 4
    vendor: android
    product: adb
  tags: adbhoney,android,adb,honeypot

tcp:
  - host:
      - "{{Hostname}}"
      - "{{Host}}:5555"
    inputs:
      - data: "434e584e0100000100001000ea000000445b0000bcb1a7b1" # CNXN
        type: hex
      - data: "686f73743a3a66656174757265733d7368656c6c5f76322c636d642c737461745f76322c6c735f76322c66697865645f707573685f6d6b6469722c617065782c6162622c66697865645f707573685f73796d6c696e6b5f74696d657374616d702c6162625f657865632c72656d6f756e745f7368656c6c2c747261636b5f6170702c73656e64726563765f76322c73656e64726563765f76325f62726f746c692c73656e64726563765f76325f6c7a342c73656e64726563765f76325f7a7374642c73656e64726563765f76325f6472795f72756e5f73656e642c6f70656e73637265656e5f6d646e73" # CLIENT INFO
        type: hex
      - data: "4f50454e6b000000000000000a0000009d030000b0afbab1" # OPEN
        type: hex
      - data: "7368656c6c3a70776400" # SHELL: PWD
        type: hex

    read-size: 1024
    matchers:
      - type: binary
        binary:
          - "57525445020000006b0000000000000000000000a8adabba"


================================================
FILE: templates/cisco-asa-honeypot-detection.yaml
================================================
id: cisco-asa-honeypot-detection

info:
  name: Cisco ASA Honeypot Detection
  author: UnaPibaGeek
  severity: info
  description: |
    A Cisco ASA honeypot has been identified.
    The HTTP response reveals a possible setup of the Cisco ASA web application honeypot.
  metadata:
    max-request: 2
    vendor: cisco
    product: asa
  tags: cisco,asa,honeypot

http:
  - method: GET
    path:
      - "{{BaseURL}}/+CSCOE+/logon.html?fcadbadd=1"
      - "{{BaseURL}}:8443/+CSCOE+/logon.html?fcadbadd=1"

    matchers-condition: and
    matchers:
      - type: status
        status:
          - 200

      - type: word
        part: body
        words:
          - '<input style="font-weight: bold; cursor: pointer;" type="submit" name="Login" value="Logon" />'


================================================
FILE: templates/citrix-honeypot-detection.yaml
================================================
id: citrix-honeypot-detection

info:
  name: Citrix Honeypot Detection
  author: UnaPibaGeek
  severity: info
  description: |
    A Citrix honeypot has been identified.
    The HTTP response reveals a possible setup of the Citrix web application honeypot.
  metadata:
    max-request: 2
    vendor: citrix
    product: citrix
  tags: citrix,honeypot

http:
  - method: GET
    path:
      - "{{BaseURL}}"

    matchers-condition: and
    matchers:
      - type: dsl
        dsl:
          - 'len(body)<2000'

      - type: word
        part: body
        words:
          - "<title>Citrix Login</title>"

      - type: word
        part: body
        words:
          - "In order to use our services, you must agree to Citrix's Terms of Service."
        negative: true


================================================
FILE: templates/conpot-siemens-honeypot-detection.yaml
================================================
id: conpot-siemens-honeypot-detection

info:
  name: Conpot (Siemens) Honeypot Detection
  author: UnaPibaGeek
  severity: info
  description: |
    A Conpot (Siemens) honeypot has been identified.
    The response to a first packet of a connection attempt differs from real installations, signaling a possible deceptive setup.
  metadata:
    max-request: 2
    vendor: conpot
    product: siemens
  tags: conpot,siemens,honeypot

tcp:
  - host:
      - "{{Hostname}}"
      - "{{Host}}:102"
    inputs:
      - data: "0300001611e00000000400c1020100c2020102c0010a"
        type: hex

    read-size: 1024
    matchers:
      - type: binary
        binary:
          - "030000130ed00000000000c1020000c2020000"


================================================
FILE: templates/cowrie-ssh-honeypot-detection.yaml
================================================
id: cowrie-ssh-honeypot-detection

info:
  name: Cowrie SSH Honeypot Detection
  author: UnaPibaGeek
  severity: info
  description: |
    A Cowrie (or Twisted) SSH honeypot has been identified.
    The response to a wrong SSH version differs from real installations, signaling a possible deceptive setup.
  metadata:
    max-request: 2
    vendor: cowrie
    product: ssh
  tags: cowrie,twisted,ssh,honeypot

tcp:
  - host:
      - '{{Hostname}}'
      - '{{Host}}:22'

    inputs:
      - data: "SSH-1337-OpenSSH_9.0\r\n"

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - 'SSH\-([0-9.-A-Za-z_ ]+)'

      - type: word
        words:
          - Protocol major versions differ.
          - bad version 1337
        condition: or


================================================
FILE: templates/dionaea-ftp-honeypot-detection.yaml
================================================
id: dionaea-ftp-honeypot-detection

info:
  name: Dionaea FTP Honeypot Detection
  author: UnaPibaGeek
  severity: info
  description: |
    A Dionaea FTP honeypot has been identified.
    The response to the 'PASS' command differs from real installations, signaling a possible deceptive setup.
  metadata:
    max-request: 4
    vendor: dionaea
    product: ftp
  tags: dionaea,ftp,honeypot

tcp:
  - host:
      - "{{Hostname}}"
      - "{{Host}}:21"
    inputs:
      - data: "USER root\r\n"
        read: 1024
      - data: "PASS \r\n"
        read: 1024

    read-size: 2048
    matchers:
      - type: word
        words:
          - "500 Syntax error: PASS requires an argument"


================================================
FILE: templates/dionaea-http-honeypot-detection.yaml
================================================
id: dionaea-http-honeypot-detection

info:
  name: Dionaea HTTP Honeypot Detection
  author: UnaPibaGeek
  severity: info
  description: |
    Dionaea HTTP honeypot has been identified.
    The response to an incorrect HTTP method reveals a possible setup of the Dioanea web application honeypot.
  metadata:
    max-request: 2
    vendor: dionaea
    product: http
  tags: dionaea,http,honeypot

http:
  - raw:
      - |
        AAAA / HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: and
    matchers:
      - type: status
        status:
          - 501

      - type: word
        part: header
        words:
          - "nginx"

      - type: word
        part: body
        words:
          - '<?xml version="1.0" encoding="ascii"?>'


================================================
FILE: templates/dionaea-mongodb-honeypot-detection.yaml
================================================
id: dionaea-mongodb-honeypot-detection

info:
  name: Dionaea MongoDB Honeypot Detection
  author: UnaPibaGeek
  severity: info
  description: |
    A MongoDB honeypot has been identified.
    The response to the 'buildinfo' command differs from real installations, signaling a possible deceptive setup.
  metadata:
    max-request: 2
    product: dionaea
    vendor: mongodb
  tags: dionaea,mongodb,honeypot

tcp:
  - inputs:
      - data: 3b0000003c300000ffffffffd40700000000000061646d696e2e24636d640000000000ffffffff14000000106275696c64696e666f000100000000
        type: hex

    host:
      - "{{Hostname}}"
      - "{{Host}}:27017"
    read-size: 2048

    matchers:
      - type: word
        part: raw
        words:
          - "version"
        negative: true

    extractors:
      - type: regex
        regex:
          - "([A-Za-z:0-9.]+)"


================================================
FILE: templates/dionaea-mqtt-honeypot-detection.yaml
================================================
id: dionaea-mqtt-honeypot-detection

info:
  name: Dionaea MQTT Honeypot Detection
  author: UnaPibaGeek
  severity: info
  description: |
    A Dionaea MQTT honeypot has been identified.
    The response to a MQTTv5 packet differs from real installations, signaling a possible deceptive setup.
  metadata:
    max-request: 2
    vendor: dionaea
    product: mqtt
  tags: dionaea,mqtt,honeypot

tcp:
  - host:
      - "{{Hostname}}"
      - "{{Host}}:1883"
    inputs:
      - data: "101000044d5154540502003c032100140000"
        type: hex

    read-size: 1024
    matchers:
      - type: binary
        binary:
          - "20020000"


================================================
FILE: templates/dionaea-mysql-honeypot-detect.yaml
================================================
id: dionaea-mysql-honeypot-detection

info:
  name: Dionaea MySQL Honeypot Detection
  author: UnaPibaGeek
  severity: info
  description: |
    A MySQL honeypot has been identified.
    The response to a connection command differs from real installations, signaling a possible deceptive setup.
  metadata:
    max-request: 2
    vendor: dionaea
    product: mysql
  tags: dionaea,mysql,honeypot

tcp:
  - inputs:
      - data: "\x4a\x00\x00\x00\x0a\x35\x2e\x31\x2e\x32\x39\x00\x0b\x00\x00\x00\x21\x3e\x34\x1b\x51\x3f\x34\x33\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"

    host:
      - "{{Hostname}}"
      - "{{Host}}:3306"
    read-size: 1024

    matchers-condition: and
    matchers:
      - type: word
        words:
          - "5.7.16"

      - type: word
        words:
          - "aaaaaaaa"


================================================
FILE: templates/dionaea-smb-honeypot-detection.yaml
================================================
id: dionaea-smb-honeypot-detection

info:
  name: Dionaea SMB Honeypot Detection
  author: UnaPibaGeek
  severity: info
  description: |
    A Dionaea SMB honeypot has been identified.
    The response to an SMB connection packet differs from real installations, signaling a possible deceptive setup.
  metadata:
    max-request: 2
    vendor: dionaea
    product: dionaea
  tags: dionaea,smb,honeypot

tcp:
  - host:
      - "{{Hostname}}"
      - "{{Host}}:445"
    inputs:
      - data: "00000045ff534d4272000000000801c8000000000000000000000000ffff0100ffff0000002200024e54204c4d20302e31320002534d4220322e3030320002534d4220322e3f3f3f00"
        type: hex

    read-size: 1024
    matchers:
      - type: binary
        binary:
          - "6538547e6c42"


================================================
FILE: templates/elasticpot-honeypot-detection.yaml
================================================
id: elasticpot-honeypot-detection

info:
  name: ElasticPot Honeypot Detection
  author: UnaPibaGeek
  severity: info
  description: |
    A ElasticPot (ElasticSearch) honeypot has been identified.
    The response to a '_cluster/settings' request differs from real installations, signaling a possible deceptive setup.
  metadata:
    max-request: 2
    vendor: ElasticPot
    product: Elasticsearch
  tags: elasticpot,elasticsearch,honeypot

http:
  - method: GET
    path:
      - "{{BaseURL}}:9200/_cluster/settings"

    matchers:
      - type: word
        part: body
        words:
          - 'index_not_found_exception'


================================================
FILE: templates/gaspot-honeypot-detection.yaml
================================================
id: gaspot-honeypot-detection

info:
  name: GasPot Honeypot Detection
  author: UnaPibaGeek
  severity: info
  description: |
    A GasPot honeypot has been identified.
    The response to the '^AI21400' command differs from real installations, signaling a possible deceptive setup.
  metadata:
    max-request: 2
    vendor: gaspot
    product: veeder-root
  tags: gaspot,veeder-root,ics,honeypot

tcp:
  - host:
      - "{{Hostname}}"
      - "{{Host}}:10001"
    inputs:
      - data: "^AI21400"

    read-size: 1024
    matchers:
      - type: word
        words:
          - "9999FF1B"


================================================
FILE: templates/mailoney-honeypot-detection.yaml
================================================
id: mailoney-honeypot-detection

info:
  name: Mailoney Honeypot Detection
  author: UnaPibaGeek
  severity: info
  description: |
    A Mailoney (SMTP) honeypot has been identified.
    The response to the 'HELP' command differs from real installations, signaling a possible deceptive setup.
  metadata:
    max-request: 2
    vendor: mailoney
    product: exim
  tags: mailoney,exim,smtp,honeypot

tcp:
  - host:
      - "{{Hostname}}"
      - "{{Host}}:25"
    inputs:
      - data: "HELP\r\n"
        read: 1024

    read-size: 1024
    matchers:
      - type: word
        words:
          - "502 Error: command \"HELP\" not implemented"


================================================
FILE: templates/redis-honeypot-detection.yaml
================================================
id: redis-honeypot-detection

info:
  name: Redis Honeypot Detection
  author: UnaPibaGeek
  severity: info
  description: |
    A Redis honeypot has been identified.
    The response to the 'QUIT' command differs from real installations, signaling a possible deceptive setup.
  metadata:
    max-request: 2
    vendor: redis
    product: redis
  tags: redis,honeypot

tcp:
  - host:
      - "{{Hostname}}"
      - "{{Host}}:6379"
    inputs:
      - data: "QUIT"

    read-size: 1024
    matchers:
      - type: word
        words:
          - "-ERR unknown command `QUIT`, with args beginning with:"


================================================
FILE: templates/snare-honeypot-detection.yaml
================================================
id: snare-honeypot-detection

info:
  name: Snare Honeypot Detection
  author: UnaPibaGeek
  severity: info
  description: |
    Snare honeypot has been identified.
    The response to an incorrect HTTP version reveals a possible setup of the Snare web application honeypot.
  metadata:
    max-request: 2
    vendor: snare
    product: http
  tags: snare,http,honeypot

http:
  - raw:
      - |
        GET / HTTP/1337
        Host: {{Hostname}}

    matchers-condition: or
    matchers:
      - type: word
        part: header
        words:
          - "Python/3.10 aiohttp/3.8.3"

      - type: word
        part: body
        words:
          - "Bad status line 'Expected dot'"
Download .txt
gitextract_juuft8tj/

├── .gitignore
├── LICENSE
├── README.md
└── templates/
    ├── adbhoney-detection-cnxn.yaml
    ├── adbhoney-detection-shell.yaml
    ├── cisco-asa-honeypot-detection.yaml
    ├── citrix-honeypot-detection.yaml
    ├── conpot-siemens-honeypot-detection.yaml
    ├── cowrie-ssh-honeypot-detection.yaml
    ├── dionaea-ftp-honeypot-detection.yaml
    ├── dionaea-http-honeypot-detection.yaml
    ├── dionaea-mongodb-honeypot-detection.yaml
    ├── dionaea-mqtt-honeypot-detection.yaml
    ├── dionaea-mysql-honeypot-detect.yaml
    ├── dionaea-smb-honeypot-detection.yaml
    ├── elasticpot-honeypot-detection.yaml
    ├── gaspot-honeypot-detection.yaml
    ├── mailoney-honeypot-detection.yaml
    ├── redis-honeypot-detection.yaml
    └── snare-honeypot-detection.yaml
Condensed preview — 20 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (18K chars).
[
  {
    "path": ".gitignore",
    "chars": 10,
    "preview": ".DS_Store\n"
  },
  {
    "path": "LICENSE",
    "chars": 1072,
    "preview": "MIT License\n\nCopyright (c) 2023 Sheila A. Berta\n\nPermission is hereby granted, free of charge, to any person obtaining a"
  },
  {
    "path": "README.md",
    "chars": 1371,
    "preview": "# Honeypots Detection\nNuclei templates for honeypots detection.\n\nThis repository contains Nuclei templates to detect sev"
  },
  {
    "path": "templates/adbhoney-detection-cnxn.yaml",
    "chars": 1230,
    "preview": "id: adbhoney-honeypot-detection\n\ninfo:\n  name: ADBHoney Honeypot Detection\n  author: UnaPibaGeek\n  severity: info\n  desc"
  },
  {
    "path": "templates/adbhoney-detection-shell.yaml",
    "chars": 1394,
    "preview": "id: adbhoney-honeypot-detection-shell\n\ninfo:\n  name: ADBHoney Honeypot Detection (shell probe)\n  author: UnaPibaGeek\n  s"
  },
  {
    "path": "templates/cisco-asa-honeypot-detection.yaml",
    "chars": 763,
    "preview": "id: cisco-asa-honeypot-detection\n\ninfo:\n  name: Cisco ASA Honeypot Detection\n  author: UnaPibaGeek\n  severity: info\n  de"
  },
  {
    "path": "templates/citrix-honeypot-detection.yaml",
    "chars": 771,
    "preview": "id: citrix-honeypot-detection\n\ninfo:\n  name: Citrix Honeypot Detection\n  author: UnaPibaGeek\n  severity: info\n  descript"
  },
  {
    "path": "templates/conpot-siemens-honeypot-detection.yaml",
    "chars": 709,
    "preview": "id: conpot-siemens-honeypot-detection\n\ninfo:\n  name: Conpot (Siemens) Honeypot Detection\n  author: UnaPibaGeek\n  severit"
  },
  {
    "path": "templates/cowrie-ssh-honeypot-detection.yaml",
    "chars": 789,
    "preview": "id: cowrie-ssh-honeypot-detection\n\ninfo:\n  name: Cowrie SSH Honeypot Detection\n  author: UnaPibaGeek\n  severity: info\n  "
  },
  {
    "path": "templates/dionaea-ftp-honeypot-detection.yaml",
    "chars": 686,
    "preview": "id: dionaea-ftp-honeypot-detection\n\ninfo:\n  name: Dionaea FTP Honeypot Detection\n  author: UnaPibaGeek\n  severity: info\n"
  },
  {
    "path": "templates/dionaea-http-honeypot-detection.yaml",
    "chars": 752,
    "preview": "id: dionaea-http-honeypot-detection\n\ninfo:\n  name: Dionaea HTTP Honeypot Detection\n  author: UnaPibaGeek\n  severity: inf"
  },
  {
    "path": "templates/dionaea-mongodb-honeypot-detection.yaml",
    "chars": 852,
    "preview": "id: dionaea-mongodb-honeypot-detection\n\ninfo:\n  name: Dionaea MongoDB Honeypot Detection\n  author: UnaPibaGeek\n  severit"
  },
  {
    "path": "templates/dionaea-mqtt-honeypot-detection.yaml",
    "chars": 635,
    "preview": "id: dionaea-mqtt-honeypot-detection\n\ninfo:\n  name: Dionaea MQTT Honeypot Detection\n  author: UnaPibaGeek\n  severity: inf"
  },
  {
    "path": "templates/dionaea-mysql-honeypot-detect.yaml",
    "chars": 829,
    "preview": "id: dionaea-mysql-honeypot-detection\n\ninfo:\n  name: Dionaea MySQL Honeypot Detection\n  author: UnaPibaGeek\n  severity: i"
  },
  {
    "path": "templates/dionaea-smb-honeypot-detection.yaml",
    "chars": 756,
    "preview": "id: dionaea-smb-honeypot-detection\n\ninfo:\n  name: Dionaea SMB Honeypot Detection\n  author: UnaPibaGeek\n  severity: info\n"
  },
  {
    "path": "templates/elasticpot-honeypot-detection.yaml",
    "chars": 628,
    "preview": "id: elasticpot-honeypot-detection\n\ninfo:\n  name: ElasticPot Honeypot Detection\n  author: UnaPibaGeek\n  severity: info\n  "
  },
  {
    "path": "templates/gaspot-honeypot-detection.yaml",
    "chars": 592,
    "preview": "id: gaspot-honeypot-detection\n\ninfo:\n  name: GasPot Honeypot Detection\n  author: UnaPibaGeek\n  severity: info\n  descript"
  },
  {
    "path": "templates/mailoney-honeypot-detection.yaml",
    "chars": 643,
    "preview": "id: mailoney-honeypot-detection\n\ninfo:\n  name: Mailoney Honeypot Detection\n  author: UnaPibaGeek\n  severity: info\n  desc"
  },
  {
    "path": "templates/redis-honeypot-detection.yaml",
    "chars": 602,
    "preview": "id: redis-honeypot-detection\n\ninfo:\n  name: Redis Honeypot Detection\n  author: UnaPibaGeek\n  severity: info\n  descriptio"
  },
  {
    "path": "templates/snare-honeypot-detection.yaml",
    "chars": 683,
    "preview": "id: snare-honeypot-detection\n\ninfo:\n  name: Snare Honeypot Detection\n  author: UnaPibaGeek\n  severity: info\n  descriptio"
  }
]

About this extraction

This page contains the full source code of the UnaPibaGeek/honeypots-detection GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 20 files (15.4 KB), approximately 5.4k tokens. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.

Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.

Copied to clipboard!