Artillery is a combination of a honeypot, monitoring tool, and alerting system. Eventually this will evolve into a hardening monitoring platform as well to detect insecure configurations from nix systems. It’s relatively simple, run ./setup.py and hit yes, this will install Artillery in /var/artillery and edit your /etc/init.d/rc.local to start artillery on boot up.

The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods
Features
+ It sets up multiple common ports that are attacked. If someone connects to these ports, it blacklists them forever (to remove blacklisted ip’s, remove them from /var/artillery/banlist.txt)
+ It monitors what folders you specify, by default it checks /var/www and /etc for modifications.
+ It monitors the SSH logs and looks for brute force attempts.
+ It will email you when attacks occur and let you know what the attack was.
Be sure to edit the /var/artillery/config to turn on mail delivery, brute force attempt customizations, and what folders to monitor.
Latest change v1.5:
+ Make sure validipv4
+ multiple bug fixes for sort IP address
Project structure
For those technical folks you can find all of the code in the following structure:
– src/core.py – main central code reuse for things shared between each module
– src/monitor.py – main monitoring module for changes to the filesystem
– src/ssh_monitor.py – main monitoring module for SSH brute forcing
– src/honeypot.py – main module for honeypot detection
– src/harden.py – check for basic hardening to the OS
– database/integrity.data – main database for maintaining sha512 hashes of filesystem
– setup.py – copies files to /var/artillery/ then edits /etc/init.d/artillery to ensure artillery starts per each reboot
Supported platforms
+ Linux
+ Windows
Download : 1.5.zip | 1.5.tar.gz
Source :https://github.com/BinaryDefense