Tags : Browse Projects

Select a tag to browse associated projects and drill deeper into the tag cloud.

cpg-dnsbl

Compare

  Analyzed about 1 month ago

This project implement two plugins to Coppermine Gallery, the objetive is block access to the Gallery. Bad-Behavior: Bad Behavior complements other link spam solutions by acting as a gatekeeper, preventing spammers from ever delivering their junk, and in many cases, from ever reading your site in ... [More] the first place. Project Honey Pot: Http:BL is a way for website administrators to take advantage of the data generated by Project Honey Pot and keep malicious or suspicious IPs off their websites. [Less]

36 lines of code

0 current contributors

over 10 years since last commit

2 users on Open Hub

Activity Not Available
0.0
 
I Use This

Nova Network Anti-reconnaissance System

Compare

  Analyzed 13 days ago

Nova is a software application for preventing and detecting hostile Network Reconnaissance. It does this by first creating a large array of thin virtual machines on the target network. These VMs are created using an updated Honeyd to be extremely lightweight. They're not your typical VMs that you ... [More] might see from VirtualBox or VMWare. They just appear to be real from the perspective of the network, and run network "services" which are just shell scripts. Second, Nova uses machine learning algorithms to automatically detect and classify attempts at hostile reconnaissance, so there's no need to go searching manually through your honeypot's log files. [Less]

37.2K lines of code

0 current contributors

about 5 years since last commit

2 users on Open Hub

Inactive
5.0
 
I Use This

Labrea Tarpit Portal

Compare

  Analyzed 2 months ago

This is a graphic way to show results from your labrea tarpit. It provides the ability to sort out based on IP's if you own your own ip space.

5.79K lines of code

0 current contributors

over 16 years since last commit

1 users on Open Hub

Activity Not Available
3.0
   
I Use This
Licenses: No declared licenses

ssh-honeypotd

Compare

  Analyzed 20 days ago

A low-interaction SSH honeypot written in C

895 lines of code

0 current contributors

over 1 year since last commit

1 users on Open Hub

Very Low Activity
0.0
 
I Use This

joomla-httpbl

Compare

  Analyzed 2 months ago

What is http:BL?, Http:BL is a way for website administrators to take advantage of the data generated by Project Honey Pot and keep malicious or suspicious IPs off their websites. The service works by publishing DNS records for IPs we have seen conducting suspicious or malicious behavior online. ... [More] Website administrators can then use this data in order to restrict access to their web servers for these IPs. This extension only implement the API to have in Joomla! the possibility to block spammer's with data from "Project Honey Pot", you need get a key from "Project Honey Pot" website. [Less]

0 lines of code

0 current contributors

over 11 years since last commit

1 users on Open Hub

Activity Not Available
0.0
 
I Use This
Mostly written in language not available
Licenses: gpl

wiki-httpbl

Compare

  Analyzed 13 days ago

Http:BL is a way for website administrators to take advantage of the data generated by Project Honey Pot and keep malicious or suspicious IPs off their websites. The service works by publishing DNS records for IPs we have seen conducting suspicious or malicious behavior online. Website ... [More] administrators can then use this data in order to restrict access to their web servers for these IPs. This extension only implement the API to have in Mediawiki the possibility to block spammer's with data from "Project Honey Pot", you need get a key from "Project Honey Pot" website. [Less]

162 lines of code

0 current contributors

over 11 years since last commit

1 users on Open Hub

Inactive
0.0
 
I Use This

goldilocks

Compare

  No analysis available

When you set security barriers, most often your goal is to keep an intruder OUT of your stuff. Goldilocks is a system that allows you to set various levels of perceived access, giving you far more information on what the attacker intended had they been granted access. By spoofing common services, an ... [More] attacker who believes they have gained access to your system, can be tracked as they issue dummy commands. Think of it as a managed honeypot for wargames or diagnostic security. See project subfolders for various service implementations. Source to be posted in September 2008. [Less]

0 lines of code

0 current contributors

0 since last commit

0 users on Open Hub

Activity Not Available
0.0
 
I Use This
Mostly written in language not available
Licenses: bsd

Tarwrap

Compare

  No analysis available

Tarwrap is a wrapper program written in C which will allow users of LaBrea Tarpit to log tarpitting, activity and bandwidth to a MySQL database for easy use. This adds many features making LaBrea and Tarwrap a robust tarpit solution.

0 lines of code

0 current contributors

0 since last commit

0 users on Open Hub

Activity Not Available
0.0
 
I Use This
Mostly written in language not available
Licenses: No declared licenses

Spam Cannibal

Compare

  Analyzed 20 days ago

SpamCannibal blocks spam at the origination server and can be configured to block DoS attacks. see: https://spamcannibal.svn.sourceforge.net/svnroot/spamcannibal spamcannibal for svn repository or visit http://search.cpan.org/

28.5K lines of code

0 current contributors

almost 10 years since last commit

0 users on Open Hub

Inactive
0.0
 
I Use This
Licenses: No declared licenses

TarProxy

Compare

  No analysis available

TarProxy is a Statistically-Driven SMTP Tarpit. TarProxy calculates the probability that an incoming mail is spam, and uses that information to control a variable-viscosity tarpit for each connection.

0 lines of code

0 current contributors

0 since last commit

0 users on Open Hub

Activity Not Available
0.0
 
I Use This
Mostly written in language not available
Licenses: No declared licenses