Discover and explore top open-source AI tools and projects—updated daily.
LLM-powered honeypot for emulating realistic systems
Top 97.7% on SourcePulse
DECEIVE is a high-interaction SSH honeypot that leverages Large Language Models (LLMs) to simulate realistic system environments and user interactions with minimal manual configuration. It targets security researchers and analysts seeking to study attacker behavior without exposing actual systems, offering automated generation of system prompts, user data, and responses.
How It Works
DECEIVE simulates a Linux server via SSH. Its core innovation lies in using an LLM, configured via a system prompt, to dynamically generate responses to attacker commands. This approach eliminates the need for manual seeding of realistic data and applications, allowing the LLM to create a believable environment on the fly. It logs all interactions, including user inputs, LLM outputs, and provides a post-session summary with a classification of benign, suspicious, or malicious activity.
Quick Start & Requirements
pip3 install -r requirements.txt
ssh-keygen -t rsa -b 4096 -f SSH/ssh_host_key
SSH/config.ini
.SSH/prompt.txt
.export OPENAI_API_KEY="<your_key>"; cd SSH; python3 ./ssh_server.py
Highlighted Details
Maintenance & Community
Contributions are welcome via pull requests and issues. The project is hosted on GitHub.
Licensing & Compatibility
Licensed under the MIT License, permitting commercial use and integration with closed-source projects.
Limitations & Caveats
DECEIVE is explicitly stated as a proof-of-concept and not production-quality. It is primarily developed on macOS 15 but should function on other UNIX-like systems, including Linux and WSL on Windows.
3 months ago
Inactive