Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/buffer/thug
Python low-interaction honeyclient
https://github.com/buffer/thug
client-honeypot honeyclient low-interaction python security-tools shellcode virustotal
Last synced: 24 days ago
JSON representation
Python low-interaction honeyclient
- Host: GitHub
- URL: https://github.com/buffer/thug
- Owner: buffer
- License: gpl-2.0
- Created: 2012-02-20T11:56:54.000Z (over 12 years ago)
- Default Branch: master
- Last Pushed: 2023-12-18T11:17:35.000Z (11 months ago)
- Last Synced: 2023-12-18T12:28:22.786Z (11 months ago)
- Topics: client-honeypot, honeyclient, low-interaction, python, security-tools, shellcode, virustotal
- Language: Python
- Homepage:
- Size: 43.9 MB
- Stars: 937
- Watchers: 73
- Forks: 237
- Open Issues: 0
-
Metadata Files:
- Readme: README.rst
- License: LICENSE.txt
Awesome Lists containing this project
- awesome-malware-analysis - Thug - Low interaction honeyclient, for (Malware Collection / Honeypots)
- fucking-awesome-malware-analysis - Thug - Low interaction honeyclient, for (Malware Collection / Honeypots)
- awesome-python-applications - Repo - bin/webscr?cmd=_s-xclick&hosted_button_id=XTDF8AHJ28CXY), [PyPI](https://pypi.org/project/thug), [Docs](https://thug-honeyclient.readthedocs.io/en/latest)) Low-interaction honeyclient designed to mimic the behavior of a web browser in order to detect and emulate malicious contents. `(linux, mac)` (<a id="tag-dev" href="#tag-dev">Dev</a> / <a id="tag-dev.security" href="#tag-dev.security">Security</a>)
- awesome-honeypot - **748**星 - interaction honeyclient (<a id="a53d22b9c5d09dc894413453f4755658"></a>未分类)
README
Thug
====|version badge| |github badge| |codefactor badge| |codecov badge| |bandit badge|
The number of client-side attacks has grown significantly in the past few years
shifting focus on poorly protected vulnerable clients. Just as the most known
honeypot technologies enable research into server-side attacks, honeyclients
allow the study of client-side attacks.A complement to honeypots, a honeyclient is a tool designed to mimic the behavior
of a user-driven network client application, such as a web browser, and be
exploited by an attacker's content.Thug is a Python low-interaction honeyclient aimed at mimicking the behavior of a
web browser in order to detect and emulate malicious contents.Documentation
-------------|docs badge|
Documentation about Thug installation and usage can be found at http://thug-honeyclient.readthedocs.io/.
Contributions
-------------|donate badge|
Thug is open source and we welcome contributions in all forms!
Thug is free to use for any purpose (even commercial ones). If you use and appreciate Thug, please consider
supporting the project with a donation using Paypal.Testing
-------To run the full test suite using tox_, run the command:
.. code-block:: bash
tox
Since tox builds and installs dependencies from scratch, using `pytest`_ for faster testing is recommended:
.. code-block:: bash
pytest --cov thug
License information
-------------------Copyright (C) 2011-2024 Angelo Dell'Aera
License: GNU General Public License, version 2
.. |version badge| image:: https://img.shields.io/pypi/v/thug.svg
:target: https://pypi.python.org/pypi/thug/
.. |github badge| image:: https://github.com/buffer/thug/workflows/Build/badge.svg
:target: https://github.com/buffer/thug
.. |codefactor badge| image:: https://www.codefactor.io/repository/github/buffer/thug/badge
:target: https://www.codefactor.io/repository/github/buffer/thug
.. |codecov badge| image:: https://codecov.io/gh/buffer/thug/branch/master/graph/badge.svg
:target: https://codecov.io/gh/buffer/thug
.. |bandit badge| image:: https://img.shields.io/badge/security-bandit-yellow.svg
:target: https://github.com/PyCQA/bandit
.. |docs badge| image:: https://readthedocs.com/projects/thug-honeyclient-thug/badge/?version=latest
:target: https://thug-honeyclient-thug.readthedocs-hosted.com/en/latest/?badge=latest
.. |donate badge| image:: https://img.shields.io/badge/Donate-PayPal-green.svg
:target: https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=XTDF8AHJ28CXY
.. _virtualenv: https://virtualenv.pypa.io/
.. _tox: https://tox.readthedocs.io/
.. _`pytest`: http://pytest.org/