Permalink
Fetching contributors…
Cannot retrieve contributors at this time
93 lines (60 sloc) 2.98 KB

Thug

version badge travis badge Code Health codefactor badge codecov badge

The number of client-side attacks has grown significantly in the past few years shifting focus on poorly protected vulnerable clients. Just as the most known honeypot technologies enable research into server-side attacks, honeyclients allow the study of client-side attacks.

A complement to honeypots, a honeyclient is a tool designed to mimic the behavior of a user-driven network client application, such as a web browser, and be exploited by an attacker's content.

Thug is a Python low-interaction honeyclient aimed at mimicing the behavior of a web browser in order to detect and emulate malicious contents.

Documentation

docs badge

Documentation about Thug installation and usage can be found at http://thug-honeyclient.readthedocs.io/.

Contributions

Thug is open source and we welcome contributions in all forms. If you would like to work on a large contribution please discuss the same with the maintainers of the project.

Thug is free to use for any purpose (even commercial ones). If you use and appreciate Thug, consider supporting the project with a donation using Paypal (details at https://buffer.github.com/thug/).

Testing

To run the full test suite using tox, type this command:

tox

Since tox builds and installs the dependencies from scratch, we recommend using pytest for faster testing:

pytest --cov thug

To test individual test files or folders:

cd tests/Java
pytest --cov thug.Java.lang test_lang.py

Support

Thanks to JetBrains for free PyCharm licenses!

License information

Copyright (C) 2011-2018 Angelo Dell'Aera <angelo.dellaera@honeynet.org>

License: GNU General Public License, version 2