Discover and explore top open-source AI tools and projects—updated daily.
cowrieSSH/Telnet honeypot with AI-driven interaction
Top 8.3% on SourcePulse
Summary
Cowrie is a medium to high interaction SSH and Telnet honeypot designed to log brute force attacks and attacker shell interactions. It offers an emulated UNIX system, proxying capabilities, and an experimental LLM mode for dynamic responses, benefiting security researchers and administrators by providing insights into attacker behavior.
How It Works
Cowrie emulates a UNIX system with a fake filesystem in its default shell mode, or acts as an SSH/Telnet proxy to monitor activity on other systems. An experimental LLM mode allows it to generate dynamic, context-aware responses to attacker commands without predefined scripts. All session logs are stored in a UML-compatible format for replayability with the playlog utility.
Quick Start & Requirements
git clone (recommended for configuration), or pip (beta).
docker run -p 2222:2222 cowrie/cowrie:latest then ssh -p 2222 root@localhost.make docker-build.pip install cowrie followed by twistd cowrie.python-virtualenv.etc/cowrie.cfg, etc/userdb.txt, and the honeyfs/ directory for fake filesystem contents.Highlighted Details
wget/curl, SFTP, and SCP file transfers.playlog and JSON logging is available.Maintenance & Community
Maintained by Michel Oosterhof. A Slack community is available. Notable past contributors are listed, including Upi Tamminen and Guilherme Borges.
Licensing & Compatibility
The README does not explicitly state the license. This requires clarification for commercial use or closed-source linking.
Limitations & Caveats
The pip installation method is still in beta and may not work as expected. The LLM mode is experimental.
3 days ago
Inactive
merrymercy
Shengjia Zhao(Chief Scientist at Meta Superintelligence Lab),
google
grahamjenson
ThilinaRajapakse
google-research
triton-inference-server
tensorflow
visenger