A powerful and deceptive Python-based honeypot designed to simulate an SSH server. This tool helps security enthusiasts, ethical hackers, and researchers analyze unauthorized access attempts and gather intelligence on malicious activities.
🚨 Disclaimer: This tool is for educational and research purposes only. Unauthorized use on systems or networks that you do not own or have explicit permission to test is illegal and unethical.
- 🎭 Simulated SSH environment: Mimics an authentic SSH server experience.
- 🗝️ Customizable credentials: Pre-defined fake user accounts for realistic interaction.
- 📜 Command handling: Basic commands like
pwd
,ls
,cd
, andcat
for an interactive shell experience. - 📊 Activity logging: Track all connection attempts and commands issued by attackers.
- 🚀 Easy setup: Quickly deploy on any machine to start analyzing unauthorized SSH attempts.
- Python 3.x
- Required libraries:
paramiko
socket
threading
Install dependencies using the command:
bash
Copy code
git clone https://github.com/vigneshcode06/ShadowSSH.git
cd ShadowSSH
chmod +x install.sh
sudo ./install.sh
🛠️ Customization
You can modify the following aspects to tailor the honeypot to your needs:
Credentials: Update the valid_credentials dictionary in the code to add or change fake accounts.
Commands: Extend the command_handler function to add more fake commands or modify existing ones.
⚠️ Warning
This tool is for educational purposes only! Unauthorized use of this tool on networks that you do not own or have explicit permission to test is illegal and unethical. Always obtain proper authorization before using this tool in real-world environments.
#ShadowSSH