HoneySSH

A basic SSH honeypot written in go

🍯 HoneySSH

HoneySSH is a medium-interaction SSH honeypot written in Go. It simulates a realistic Ubuntu filesystem to trick attackers into believing they have compromised a real server. It logs every keystroke, command, and password, visualizing the data on a live "Cyber Threat Intelligence" dashboard.

(Replace this link with a real screenshot of your cool dashboard)

✨ Features

🕵️ Fake Filesystem: A realistic, in-memory virtual filesystem (based on Ubuntu 20.04) that attackers can traverse (cd, ls, cat, pwd).

🎭 Immersive Deception: dynamic prompts (root@server:/etc$), fake processes (/proc), and fake system info.

🍬 Honey Tokens: Intentionally planted sensitive files (AWS keys in .env, fake id_rsa, password.txt) to waste attackers' time.

📊 Live Dashboard: A real-time, cyberpunk-themed web interface showing:

    Live Attack Feed

    GeoIP World Map (Leaflet.js)

    Top 10 Attacker IPs, Passwords, and Commands

💾 Persistence: All events are saved to a local SQLite database (honeyssh.db), so you never lose intel on restart.

🤣 Troll Mode: Snarky responses to sudo, rm -rf, and other malicious commands.