DICOMHawk is a powerful and efficient honeypot for DICOM servers, designed to attract and log unauthorized access attempts and interactions.
Built using Flask and pynetdicom, DICOMHawk offers a streamlined web interface for monitoring and managing DICOM interactions in real-time.
Clone the repository:
git clone https://github.com/gtheodoridis/DICOMHawk.git
cd dicomhawk
Start the services with Docker Compose:
docker-compose up -d
Access the Web Interface:
Open a web browser and go to http://127.0.0.1:5000
to access the DICOMHawk web interface. Here, you can monitor server status, view active associations, and check the logs.
Test the DICOM Server:
Use DCMTK tools to interact with the DICOM server.
echoscu 127.0.0.1 11112
For more information click here.
GraphRunner is a powerful post-exploitation toolset designed for interacting with the Microsoft Graph API, enabling…
NailaoLoader employs sophisticated techniques to obscure its execution flow, leveraging Windows Management Instrumentation (WMI) for…
The CVE-2025-21333 Proof of Concept (PoC) demonstrates an exploit targeting a vulnerability in the vkrnlintvsp.sys…
PowerShell has emerged as a vital tool in Digital Forensics and Incident Response (DFIR), offering…
Brainstorm is an innovative web fuzzing tool that integrates traditional fuzzing techniques with AI-powered insights,…
Vulnerability research is a critical aspect of cybersecurity that focuses on identifying, analyzing, and documenting…