Beelzebub ChatGPT Honeypot
RepositoryFree[Penetration Testing Findings Generator](https://github.com/Stratus-Security/FinGen)
Capabilities13 decomposed
multi-protocol honeypot service instantiation via builder pattern
Medium confidenceConstructs complete honeypot systems across SSH, HTTP, and TCP protocols using a Builder pattern implementation that coordinates configuration parsing, protocol manager initialization, and service lifecycle management. The Director component orchestrates the building sequence, loading YAML configurations and delegating protocol-specific setup to specialized builders, enabling low-code honeypot deployment without manual service wiring.
Uses Builder pattern with Director coordination to abstract protocol-specific initialization complexity, allowing YAML-driven honeypot composition without code changes. Each protocol (SSH, HTTP, TCP) has its own builder implementation that the Director chains together in sequence.
Simpler than manual service instantiation (e.g., Cowrie or Dionaea) because configuration drives all setup; more flexible than static honeypot deployments because builders can be extended for new protocols without modifying core initialization logic.
llm-powered dynamic command response generation for ssh honeypots
Medium confidenceIntegrates OpenAI and Ollama LLM providers to generate contextually realistic SSH command responses in real-time, replacing static response files. When an attacker executes a command matching configured regex patterns, the system constructs a prompt from the matched command and sends it to the configured LLM provider, receiving dynamically generated output that mimics legitimate system behavior. This approach uses a plugin architecture where LLMHoneypot implements the response generator interface.
Implements LLMHoneypot plugin that wraps both OpenAI and Ollama providers behind a unified interface, allowing runtime provider switching via configuration. Uses regex-based command matching to selectively apply LLM generation only to high-value commands, reducing latency and cost for low-value interactions.
More realistic than static honeypots (Cowrie, Dionaea) because responses vary contextually; more cost-effective than pure cloud-based approaches because Ollama option eliminates API fees; faster than naive LLM-per-command because regex filtering reduces LLM invocations.
plugin system for extensible honeypot handlers and response generators
Medium confidenceImplements a plugin architecture that allows custom handlers and response generators to be registered at runtime without modifying core Beelzebub code. The LLMHoneypot plugin demonstrates this pattern, implementing a response generator interface that can be swapped for alternative implementations. Plugins can be loaded from external Go packages or compiled into the binary, enabling operators to extend honeypot functionality for custom protocols or attack simulation scenarios.
Implements plugin system via Go interfaces, allowing custom response generators and handlers to be registered without modifying core code. LLMHoneypot plugin demonstrates pattern; new plugins can implement same interface and be compiled into binary.
More extensible than monolithic honeypots because plugins enable custom functionality; more maintainable than forking Beelzebub because plugins are separate from core code; requires compilation unlike dynamic plugin systems but provides type safety and performance.
docker and kubernetes deployment with container orchestration support
Medium confidenceProvides Docker containerization and Kubernetes deployment manifests for running Beelzebub in containerized environments. Docker images include all dependencies and can be deployed as standalone containers or orchestrated via Kubernetes. Kubernetes support includes ConfigMap-based configuration management, Service definitions for network exposure, and StatefulSet patterns for persistent honeypot deployments. This enables honeypots to be deployed alongside other containerized security infrastructure.
Provides both Docker and Kubernetes deployment patterns, enabling honeypots to be deployed in containerized environments with native orchestration support. Configuration is managed via Kubernetes ConfigMaps, enabling GitOps workflows and declarative infrastructure management.
More portable than binary deployment because containers include all dependencies; more scalable than single-instance deployment because Kubernetes enables multi-instance orchestration; enables infrastructure-as-code workflows unlike manual deployment.
customizable llm prompts for attack-specific response generation
Medium confidenceAllows operators to customize LLM prompts that guide response generation for different attack scenarios, enabling fine-tuned honeypot behavior without code changes. Prompts can be configured per-protocol or per-command, allowing different response styles for SSH commands vs HTTP requests. This enables operators to simulate specific system behaviors (e.g., vulnerable database responses, misconfigured web servers) by crafting targeted prompts.
Enables per-protocol and per-command prompt customization via YAML configuration, allowing operators to fine-tune LLM responses without code changes. Prompts can include placeholders for dynamic data (command, request path, etc.), enabling context-aware response generation.
More flexible than fixed LLM prompts because operators can customize responses for specific scenarios; more realistic than static responses because LLM can generate contextual output; requires prompt engineering expertise unlike simple static responses.
protocol-agnostic event tracing and attack recording
Medium confidenceImplements a Singleton tracer component that captures all honeypot interactions (SSH commands, HTTP requests, TCP packets) into structured event logs, with pluggable backends for persistence and real-time publishing. Events include attack metadata (source IP, timestamp, protocol, payload), and the tracer can route events to RabbitMQ for stream processing, Prometheus for metrics aggregation, or local file storage. The tracer uses a Strategy pattern to support multiple output backends without coupling to specific implementations.
Uses Singleton tracer with Strategy pattern backends to decouple event capture from persistence, allowing simultaneous multi-backend publishing (RabbitMQ + Prometheus + file) without code changes. Event schema is protocol-agnostic, normalizing SSH, HTTP, and TCP interactions into unified format.
More flexible than single-backend honeypots (Cowrie writes only to files) because multiple backends can be active simultaneously; more scalable than file-only logging because RabbitMQ enables distributed stream processing; integrates natively with Prometheus unlike traditional honeypots requiring custom exporters.
http honeypot endpoint configuration with static and llm-generated responses
Medium confidenceDefines configurable HTTP honeypot services that listen on specified ports and respond to requests on defined endpoint paths with either static response bodies or LLM-generated content. Each endpoint can be configured with HTTP method matching (GET, POST, etc.), response status codes, custom headers, and optional regex-based request body matching. The HTTP honeypot service uses the same LLMHoneypot plugin as SSH, allowing dynamic response generation for sophisticated attack simulation.
Supports both static response templates and LLM-powered dynamic responses for HTTP endpoints, allowing operators to choose between low-latency static responses for high-volume attacks and realistic LLM responses for sophisticated attackers. Endpoint configuration is declarative in YAML, enabling rapid honeypot customization without code changes.
More flexible than basic HTTP honeypots (e.g., simple Python Flask apps) because configuration-driven endpoint definition supports multiple paths/methods without code; more realistic than static honeypots because LLM integration can generate contextual responses; faster than full web application simulation because static responses avoid LLM latency for known attack patterns.
ssh honeypot with regex-based command matching and authentication
Medium confidenceImplements an SSH server honeypot that accepts connections with configurable credentials, matches executed commands against regex patterns, and returns either static or LLM-generated responses. The SSH honeypot can be configured with custom server version strings and server names to mimic specific SSH implementations. Command matching uses regex patterns to identify attack commands (e.g., privilege escalation attempts, reconnaissance commands) and route them to appropriate response handlers.
Combines regex-based command pattern matching with optional LLM response generation, allowing operators to define high-value attack commands that trigger realistic LLM responses while low-value commands return fast static responses. Server version and name are fully configurable, enabling honeypots that mimic specific SSH implementations.
More realistic than basic SSH honeypots (e.g., simple paramiko-based servers) because LLM integration generates contextual responses; more efficient than full SSH server simulation because regex filtering reduces LLM invocations; more flexible than Cowrie because configuration-driven command matching avoids code changes.
tcp honeypot for custom protocol simulation
Medium confidenceProvides a generic TCP honeypot service that listens on configurable ports and responds to raw TCP connections with static or LLM-generated responses. Unlike SSH and HTTP honeypots, TCP honeypots are protocol-agnostic and can simulate any TCP-based service (Telnet, FTP, custom protocols) by matching incoming data against regex patterns and returning configured responses. This enables honeypots for proprietary or legacy protocols without protocol-specific implementation.
Provides protocol-agnostic TCP honeypot that works with any TCP-based service through regex-based pattern matching and configurable responses. Unlike SSH and HTTP honeypots with protocol-specific logic, TCP honeypots are purely data-driven, enabling rapid deployment for custom or legacy protocols.
More flexible than protocol-specific honeypots because it supports any TCP service; faster to deploy than custom honeypot implementations because configuration-driven approach avoids coding; less realistic than protocol-specific honeypots because regex matching cannot understand protocol semantics.
rabbitmq event publishing for distributed attack analysis
Medium confidenceIntegrates with RabbitMQ message broker to publish honeypot events in real-time, enabling downstream stream processing, SIEM ingestion, and distributed analysis. Events are serialized as JSON and published to configurable RabbitMQ exchanges/queues, allowing multiple consumers to subscribe to attack data without coupling to the honeypot. This enables architectures where honeypots feed threat intelligence pipelines, incident response workflows, and security analytics platforms.
Implements RabbitMQ backend as pluggable tracer strategy, allowing simultaneous publishing to RabbitMQ and other backends (Prometheus, files) without code changes. Events are published asynchronously to avoid blocking honeypot response handling, enabling high-throughput attack capture.
More scalable than file-based event logging because RabbitMQ enables distributed processing; more flexible than direct SIEM integration because RabbitMQ decouples honeypot from downstream systems; enables multi-consumer architectures unlike single-destination logging.
prometheus metrics export for honeypot monitoring and alerting
Medium confidenceExports honeypot activity as Prometheus time-series metrics, enabling real-time monitoring, dashboarding, and alerting on attack patterns. Metrics include attack frequency by protocol, source IP distribution, command execution patterns, and response latencies. The tracer publishes metrics in Prometheus text format on a configurable HTTP endpoint, allowing Prometheus servers to scrape honeypot metrics alongside other infrastructure metrics.
Implements Prometheus metrics export as pluggable tracer backend, allowing simultaneous metrics export and event publishing without code changes. Metrics are generated on-demand during scrape operations, reducing overhead compared to continuous metric aggregation.
More integrated than custom monitoring solutions because Prometheus is industry-standard; more flexible than application-specific dashboards because metrics can be combined with infrastructure metrics; enables alerting capabilities that file-based logging cannot provide.
yaml-based configuration for honeypot services and global settings
Medium confidenceProvides declarative YAML configuration system for defining honeypot services (SSH, HTTP, TCP), protocol-specific parameters, LLM provider settings, and global logging/tracing configuration. Configuration is split into core configuration (beelzebub.yaml) for global settings and service configuration files for individual honeypot definitions. The parser component loads and validates YAML, enabling operators to deploy honeypots without code changes or recompilation.
Separates core configuration (global settings) from service configuration (per-honeypot definitions), allowing operators to manage global settings independently from individual honeypot deployments. Configuration is fully declarative, enabling version control and GitOps workflows.
More flexible than hardcoded honeypots because configuration-driven approach enables rapid changes; more maintainable than code-based configuration because YAML is human-readable; enables GitOps workflows unlike manual service configuration.
telegram real-time attack notifications
Medium confidenceSends real-time attack notifications to Telegram channels/users when honeypot events occur, enabling immediate alerting to security teams. The notification system integrates with the tracer to subscribe to attack events and format them as Telegram messages. This provides out-of-band alerting independent of SIEM or monitoring systems, ensuring critical attacks are immediately visible to on-call personnel.
Integrates Telegram notifications as pluggable tracer backend, allowing simultaneous notification to Telegram and other backends (RabbitMQ, Prometheus) without code changes. Notifications are sent asynchronously to avoid blocking honeypot response handling.
More immediate than SIEM-based alerting because Telegram notifications are sent in real-time; more accessible than email alerts because Telegram is mobile-friendly; enables out-of-band alerting independent of monitoring infrastructure.
Capabilities are decomposed by AI analysis. Each maps to specific user intents and improves with match feedback.
Related Artifactssharing capabilities
Artifacts that share capabilities with Beelzebub ChatGPT Honeypot, ranked by overlap. Discovered automatically through the match graph.
harbor
One command brings a complete pre-wired LLM stack with hundreds of services to explore.
haystack-ai
LLM framework to build customizable, production-ready LLM applications. Connect components (models, vector DBs, file converters) to pipelines or agents that can interact with your data.
BeeBot
Early-stage project for wide range of tasks
Puppeteer MCP Server
Automate browser interactions and take screenshots via Puppeteer MCP.
strix
Open-source AI hackers to find and fix your app’s vulnerabilities.
haystack
Open-source AI orchestration framework for building context-engineered, production-ready LLM applications. Design modular pipelines and agent workflows with explicit control over retrieval, routing, memory, and generation. Built for scalable agents, RAG, multimodal applications, semantic search, and
Best For
- ✓security teams deploying multi-protocol deception infrastructure
- ✓penetration testers building custom honeypot networks for red team exercises
- ✓developers integrating honeypots into larger threat detection platforms
- ✓security researchers studying attacker behavior and command patterns
- ✓threat intelligence teams analyzing attack sophistication through honeypot interactions
- ✓organizations requiring air-gapped honeypots (using Ollama) for compliance reasons
- ✓security researchers building custom honeypot extensions for research projects
- ✓organizations with proprietary protocols requiring custom honeypot implementations
Known Limitations
- ⚠Builder pattern adds initialization overhead (~50-100ms per service) compared to direct instantiation
- ⚠Configuration must be valid YAML; no runtime validation of protocol-specific constraints until service startup
- ⚠Single-threaded Director orchestration may bottleneck initialization of 10+ simultaneous honeypot services
- ⚠LLM latency (500ms-2s per response) may be detectable by sophisticated attackers; responses slower than real systems
- ⚠Prompt injection attacks possible if attacker commands are not sanitized before LLM submission
- ⚠OpenAI integration requires valid API key and incurs per-token costs; Ollama requires local GPU/CPU resources
Requirements
Input / Output
UnfragileRank
UnfragileRank is computed from adoption signals, documentation quality, ecosystem connectivity, match graph feedback, and freshness. No artifact can pay for a higher rank.
About
[Penetration Testing Findings Generator](https://github.com/Stratus-Security/FinGen)
Categories
Alternatives to Beelzebub ChatGPT Honeypot
Are you the builder of Beelzebub ChatGPT Honeypot?
Claim this artifact to get a verified badge, access match analytics, see which intents users search for, and manage your listing.
Get the weekly brief
New tools, rising stars, and what's actually worth your time. No spam.
Data Sources
Looking for something else?
Search →