Skip to content

LoganthP/VoidSentinal-Honeypot

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

4 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

Cloud Honeypot Intelligence & Attacker Profiling System

An Advanced AI-Powered Cybersecurity Deception Platform for Real-Time Threat Detection & Attacker Intelligence


๐Ÿ”ฅ Deceive โ€ข Detect โ€ข Analyze โ€ข Visualize

A full-stack cybersecurity platform that deploys realistic cloud honeypots, captures attacker behavior, profiles threats using AI, and visualizes attacks through an interactive global dashboard.


๐ŸŒŸ Key Features

๐ŸŽฏ Honeypot Traps

  • ๐Ÿ“‚ Fake S3 Bucket โ€” Simulates AWS S3 operations (GET, PUT, DELETE)
  • ๐Ÿ”‘ Fake AWS Credentials โ€” Baits credential harvesters
  • ๐Ÿ” Fake Admin Login Portal โ€” Captures brute-force attempts
  • ๐Ÿ—„๏ธ Fake Database Config Leak โ€” Exposes decoy secrets

๐Ÿค– AI-Powered Threat Profiling

  • โšก 5-Provider AI Waterfall Engine
  • ๐Ÿง  Groq โ†’ Gemini โ†’ OpenRouter โ†’ Rule-Based
  • ๐Ÿ“‰ Logarithmic Threat Scoring
  • ๐Ÿ’พ SQLite Cached Profiles
  • ๐Ÿšจ 5-Tier Threat Classification

๐ŸŒ Live Threat Dashboard

  • ๐Ÿ—บ๏ธ Global Threat Map with Curved Attack Flow Lines
  • ๐Ÿ“ Geo-Located Attacker Markers
  • ๐Ÿ“Š Real-Time Event Feed
  • ๐Ÿ“œ Sliding Live Event Log Drawer
  • ๐Ÿง  Animated AI Profile Cards
  • ๐Ÿ“ˆ Telemetry + Analytics Modules

โš”๏ธ Attack Simulator

  • ๐ŸŒŽ 25 Simulated Attackers from 15+ Countries
  • ๐Ÿ•น๏ธ 4 Simulation Speeds
  • โฑ๏ธ Auto-Termination Controls
  • ๐ŸŽ›๏ธ Dynamic Speed Adjustment

๐Ÿ—๏ธ System Architecture

flowchart TD

A[๐ŸŒ External Attackers / Bots] --> B[๐Ÿชค Honeypot Trap Layer]

subgraph TrapLayer [Honeypot Services]
B1[Fake S3 Bucket]
B2[Fake AWS Credentials]
B3[Fake Admin Login]
B4[Fake DB Config Leak]
end

B --> B1
B --> B2
B --> B3
B --> B4

B1 --> C[๐Ÿ“ฅ Event Capture Engine]
B2 --> C
B3 --> C
B4 --> C

C --> D[๐ŸŒ IP Geolocation Service]
D --> E[๐Ÿ—„๏ธ SQLite Database]

E --> F[๐Ÿค– AI Profiling Engine]

subgraph AIEngine [Threat Intelligence Waterfall]
F1[Groq]
F2[Gemini]
F3[OpenRouter]
F4[Rule-Based Engine]
end

F --> F1
F --> F2
F --> F3
F --> F4

F --> G[๐Ÿ“Š Threat Score Generation]

G --> H[โšก React Dashboard]

subgraph Dashboard [Visualization Layer]
H1[Global Threat Map]
H2[Live Event Feed]
H3[AI Profile Cards]
H4[Telemetry]
H5[Analytics Charts]
end

H --> H1
H --> H2
H --> H3
H --> H4
H --> H5

I[๐ŸŽฎ Attack Simulator] --> B
Loading

๐Ÿ› ๏ธ Tech Stack

Layer Technology
Backend Python, Flask, SQLite
Frontend React, Vite
AI Models Groq, Gemini, OpenRouter
Visualization Leaflet, Recharts
Geolocation ip-api.com
Alerts Slack Webhooks

โšก Quick Start

1๏ธโƒฃ Backend Setup

cd backend

pip install flask flask-cors python-dotenv requests groq google-generativeai openai pdfplumber pandas

cp .env.example .env

python db.py
python app.py

2๏ธโƒฃ Frontend Setup

cd frontend

npm install

npm run dev

๐Ÿ” Environment Variables

Configure inside backend/.env

Variable Purpose
GROQ_API_KEY Primary AI Model
GEMINI_API_KEY Fallback AI
OPENROUTER_API_KEY Last-Resort AI
SLACK_WEBHOOK_URL Alert Notifications

๐Ÿงช Testing Honeypots

curl -X POST http://localhost:5000/admin/login \
-H "Content-Type: application/json" \
-d '{"user":"admin","pass":"admin123"}'
curl http://localhost:5000/aws/credentials
curl http://localhost:5000/fake-s3/prod-backup/db-dump.sql

๐Ÿ“ก API Endpoints

Honeypot APIs

Endpoint Method Description
/fake-s3/<bucket>/<key> GET/PUT/DELETE Fake S3 Access
/aws/credentials GET/POST Fake AWS Keys
/admin/login GET/POST Admin Login Trap
/config/database GET Fake DB Leak

Simulator APIs

Endpoint Method
/api/simulator/start POST
/api/simulator/stop POST
/api/simulator/status GET

๐Ÿ“‚ Project Structure

Honeypot/
โ”œโ”€โ”€ backend/
โ”‚   โ”œโ”€โ”€ uploads/
โ”‚   โ”œโ”€โ”€ app.py
โ”‚   โ”œโ”€โ”€ analyzer.py
โ”‚   โ”œโ”€โ”€ capture.py
โ”‚   โ”œโ”€โ”€ db.py
โ”‚   โ”œโ”€โ”€ simulator.py
โ”‚   โ”œโ”€โ”€ alerter.py
โ”‚   โ””โ”€โ”€ honeypot.db
โ”‚
โ”œโ”€โ”€ frontend/
โ”‚   โ”œโ”€โ”€ src/
โ”‚   โ”‚   โ”œโ”€โ”€ App.jsx
โ”‚   โ”‚   โ”œโ”€โ”€ Dashboard.jsx
โ”‚   โ”‚   โ”œโ”€โ”€ ThreatMap.jsx
โ”‚   โ”‚   โ”œโ”€โ”€ ProfileCard.jsx
โ”‚   โ”‚   โ”œโ”€โ”€ Telemetry.jsx
โ”‚   โ”‚   โ””โ”€โ”€ ...
โ”‚   โ”‚
โ”‚   โ”œโ”€โ”€ package.json
โ”‚   โ””โ”€โ”€ vite.config.js
โ”‚
โ””โ”€โ”€ README.md

๐Ÿš€ Future Enhancements

  • Kubernetes Honeypot Support
  • Machine Learning Anomaly Detection
  • SIEM Integration
  • Multi-Tenant Architecture
  • Docker Deployment

๐Ÿ“œ License

Educational / Research Purposes Only

โš ๏ธ Do not deploy honeypots without authorization.

About

AI-powered cloud honeypot platform for real-time attacker profiling, threat intelligence, and live cybersecurity visualization dashboard.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors