|version badge| |travis badge| |landscape badge| |codefactor badge| |codecov badge| |docs badge|
The number of client-side attacks has grown significantly in the past few years
shifting focus on poorly protected vulnerable clients. Just as the most known
honeypot technologies enable research into server-side attacks, honeyclients
allow the study of client-side attacks.
A complement to honeypots, a honeyclient is a tool designed to mimic the behavior
of a user-driven network client application, such as a web browser, and be
exploited by an attacker's content.
Thug is a Python low-interaction honeyclient aimed at mimicing the behavior of a
web browser in order to detect and emulate malicious contents.
Documentation about Thug installation and usage can be found at http://thug-honeyclient.readthedocs.io/.
Thug is open source and free to use for any purpose (even commercial ones). If
you use and appreciate Thug, consider supporting the project with a donation
using Paypal (details at https://buffer.github.com/thug/).
Copyright (C) 2011-2018 Angelo Dell'Aera email@example.com
License: GNU General Public License, version 2
.. |version badge| image:: https://img.shields.io/pypi/v/thug.svg
.. |travis badge| image:: https://img.shields.io/travis/buffer/thug/master.svg
.. |landscape badge| image:: https://landscape.io/github/buffer/thug/master/landscape.png
:alt: Code Health
.. |codefactor badge| image:: https://www.codefactor.io/repository/github/buffer/thug/badge
.. |codecov badge| image:: https://codecov.io/gh/buffer/thug/branch/master/graph/badge.svg
.. |docs badge| image:: https://readthedocs.org/projects/thug-honeyclient/badge/?version=latest