Thug
Tool and Usage
Project details
- License
- GPLv2
- Programming language
- Python
- Author
- Angelo Dell'Aera
- Latest release
- 6.10
- Latest release date
Project health
Why this tool?
The honeypot concept is a well-known technique to collect attack patterns on servers and systems. Tools like Thug are considered to be a honeyclient, or client honeypot. These tools collect attacks against client applications. For example by mimicking a web application and visit a malicious page to see if any code is attacking the application.
Usage and audience
Thug is commonly used for learning, malware analysis, or threat discovery. Target users for this tool are security professionals.
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
Strengths
- + The source code of this software is available
Installation
Supported operating systems
Thug is known to work on Linux.
Thug alternatives
Similar tools to Thug:
Cowrie
Cowrie is a honeypot to emulate SSH and telnet services. It can be used to learn attack methods and as an additional layer for security monitoring.
Dionaea
Dionaea is a honeypot that can emulate a range of services like FTP, HTTP, MySQL, and SMB. It can be used to see and learn how attackers work.
Dockpot
Dockpot uses Docker containers and HonSSH to create on-demand SSH honeypots. It forwards traffic for analysis and learning about attack patterns.
This tool page was updated at . Found an improvement? Help the community by submitting an update.
Related tool information
Categories
This tool is categorized as a client honeypot and honeypot.