DICOMHawk is a powerful and efficient honeypot for DICOM servers, designed to attract and log unauthorized access attempts and interactions.
Built using Flask and pynetdicom, DICOMHawk offers a streamlined web interface for monitoring and managing DICOM interactions in real-time.
Clone the repository:
git clone https://github.com/gtheodoridis/DICOMHawk.git
cd dicomhawk
Start the services with Docker Compose:
docker-compose up -d
Access the Web Interface:
Open a web browser and go to http://127.0.0.1:5000
to access the DICOMHawk web interface. Here, you can monitor server status, view active associations, and check the logs.
Test the DICOM Server:
Use DCMTK tools to interact with the DICOM server.
echoscu 127.0.0.1 11112
For more information click here.
The Silk Wasm is a tool designed to obfuscate HTML smuggling techniques using WebAssembly (Wasm).…
TokenSmith is a powerful tool designed to generate Entra ID access and refresh tokens, catering…
Sunder is a Windows rootkit inspired by the Lazarus Group's FudModule rootkit, designed to exploit…
AgentTesla is a sophisticated and persistent malware that has been a significant cybersecurity threat since…
The ability to execute commands silently using cmd.exe while redirecting both standard output (STDOUT) and…
The Process Inject Kit is a specialized toolkit designed to enhance and customize process injection…