Snare : Super Next Generation Advanced Reactive HonEypot

Snare is a super next generation advanced reactive honeypot.It is a web application honeypot sensor attracting all sort of maliciousness from the Internet.

Basic Concepts

  • Surface first. Focus on the attack surface generation.
  • Sensors and masters. Lightweight collectors and central decision maker (tanner).

Getting Started

  • You need Python3. We tested primarily with >=3.5
  • This was tested with a recent Ubuntu based Linux.

Also Read – RBuster : Yet Another Dirbuster

Steps To Setup

  • Get the tool using: git clone https://github.com/mushorg/snare.git and cd snare
  • Install requirements: sudo pip3 install -r requirements.txt
  • Setup the tool using : sudo python3 setup.py install
  • Clone a page: sudo clone --target http://example.com
  • Run SNARE: sudo snare --port 8080 --page-dir example.com
  • Test: Visit http://localhost:8080/index.html
  • (Optionally) Have your own tanner service running.

Docker Build Instructions

Change current directory to  project directory
docker-compose build
docker-compose up

Testing

In order to run the tests and receive a test coverage report, we recommend running pytest:

pip install pytest pytest-cov
sudo pytest –cov-report term-missing –cov=snare snare/tests/

Sample Output

R K

Recent Posts

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

16 hours ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

18 hours ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

19 hours ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

19 hours ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

19 hours ago

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

2 days ago