A honeypot to collect media mistakenly or purposely streamed to Chromecast devices on the internet.
This project aims to work with pychromecast, a Python implementation of the Chromecast client API. So anyone scanning the internet and connecting to this honeypot shall think this is an actual device and do their shenanigans there.
The Makefile provides a few helpful scripts, such as setting up a virtual environment for development. Once everything's setup, you can use a few command line flags to disable certain services from honeycast:
(venv) $ ./app.py --help Usage: app.py [options] Options: -h, --help show this help message and exit --no-web Don't start eureka webserver --no-zeroconf Don't advertise using zeroconf --no-cast Don't run a cast server
Honeycast ships with a Dockerfile, which generates very plain, self-signed X509 certificates during build. You can specify your own certificates in the config.
Honeycast is released under the MIT license.
 - The Original Website describing the Hack
 - Testimony of Hacker Giraffe