<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Patrick Di Fazio</title>
    <description>The latest articles on DEV Community by Patrick Di Fazio (@patrick_difazio_fe683f93).</description>
    <link>https://dev.to/patrick_difazio_fe683f93</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3712421%2Ff23c55dd-b2a3-4052-a5d2-d3855b7f805a.png</url>
      <title>DEV Community: Patrick Di Fazio</title>
      <link>https://dev.to/patrick_difazio_fe683f93</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/patrick_difazio_fe683f93"/>
    <language>en</language>
    <item>
      <title>Krawl: A modern Honeypot and Deception server 🍯

I wanted to share an open‑source project I’ve been working on and get feedback from people interested in web security, self‑hosting, and deception techniques :)

https://github.com/BlessedRebuS/Krawl</title>
      <dc:creator>Patrick Di Fazio</dc:creator>
      <pubDate>Thu, 15 Jan 2026 15:23:57 +0000</pubDate>
      <link>https://dev.to/patrick_difazio_fe683f93/krawl-a-modern-honeypot-and-deception-server-i-wanted-to-share-an-open-source-project-ive-4c2m</link>
      <guid>https://dev.to/patrick_difazio_fe683f93/krawl-a-modern-honeypot-and-deception-server-i-wanted-to-share-an-open-source-project-ive-4c2m</guid>
      <description>&lt;div class="crayons-card c-embed text-styles text-styles--secondary"&gt;
    &lt;div class="c-embed__content"&gt;
        &lt;div class="c-embed__cover"&gt;
          &lt;a href="https://github.com/BlessedRebuS/Krawl" class="c-link align-middle" rel="noopener noreferrer"&gt;
            &lt;img alt="" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Frepository-images.githubusercontent.com%2F1113893223%2F9e545c59-d956-4ebf-ae31-34762a51b393" height="500" class="m-0" width="1300"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="c-embed__body"&gt;
        &lt;h2 class="fs-xl lh-tight"&gt;
          &lt;a href="https://github.com/BlessedRebuS/Krawl" rel="noopener noreferrer" class="c-link"&gt;
            GitHub - BlessedRebuS/Krawl: Krawl is a lightweight cloud native web deception server and anti-crawler that creates fake web applications with low-hanging vulnerabilities and realistic, randomly generated decoy data
          &lt;/a&gt;
        &lt;/h2&gt;
          &lt;p class="truncate-at-3"&gt;
            Krawl is a lightweight cloud native web deception server and anti-crawler that creates fake web applications with low-hanging vulnerabilities and realistic, randomly generated decoy data - BlessedR...
          &lt;/p&gt;
        &lt;div class="color-secondary fs-s flex items-center"&gt;
            &lt;img alt="favicon" class="c-embed__favicon m-0 mr-2 radius-0" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fgithub.githubassets.com%2Ffavicons%2Ffavicon.svg" width="32" height="32"&gt;
          github.com
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;


</description>
    </item>
    <item>
      <title>[Boost]</title>
      <dc:creator>Patrick Di Fazio</dc:creator>
      <pubDate>Thu, 15 Jan 2026 15:20:41 +0000</pubDate>
      <link>https://dev.to/patrick_difazio_fe683f93/-3pdj</link>
      <guid>https://dev.to/patrick_difazio_fe683f93/-3pdj</guid>
      <description>&lt;div class="ltag__link"&gt;
  &lt;a href="/patrick_difazio_fe683f93" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3712421%2Ff23c55dd-b2a3-4052-a5d2-d3855b7f805a.png" alt="patrick_difazio_fe683f93"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://dev.to/patrick_difazio_fe683f93/krawl-a-modern-honeypot-and-deception-server-bfe" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Krawl: A modern Honeypot and Deception server 🍯&lt;/h2&gt;
      &lt;h3&gt;Patrick Di Fazio ・ Jan 15&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#security&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#selfhosted&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#opensource&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#webdev&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


</description>
      <category>security</category>
      <category>selfhosted</category>
      <category>opensource</category>
      <category>webdev</category>
    </item>
    <item>
      <title>Krawl: A modern Honeypot and Deception server 🍯</title>
      <dc:creator>Patrick Di Fazio</dc:creator>
      <pubDate>Thu, 15 Jan 2026 13:26:09 +0000</pubDate>
      <link>https://dev.to/patrick_difazio_fe683f93/krawl-a-modern-honeypot-and-deception-server-bfe</link>
      <guid>https://dev.to/patrick_difazio_fe683f93/krawl-a-modern-honeypot-and-deception-server-bfe</guid>
      <description>&lt;p&gt;I wanted to share an open‑source project I’ve been working on and get feedback from people interested in web security, self‑hosting, and deception techniques :)&lt;/p&gt;

&lt;p&gt;GitHub repository:&lt;br&gt;
&lt;a href="https://github.com/BlessedRebuS/Krawl" rel="noopener noreferrer"&gt;https://github.com/BlessedRebuS/Krawl&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Krawl?
&lt;/h2&gt;

&lt;p&gt;Krawl is a cloud‑native deception server designed to detect, delay, and analyze malicious web crawlers and automated scanners.&lt;/p&gt;

&lt;p&gt;It exposes realistic fake web applications populated with common “low‑hanging fruit” such as admin panels, configuration files, and exposed (fake) credentials. These decoys attract suspicious activity and make it easier to clearly distinguish malicious behavior from legitimate crawlers.&lt;/p&gt;

&lt;p&gt;By intentionally wasting attacker resources, Krawl helps surface useful signals such as attack paths, IP addresses, and user agents.&lt;/p&gt;

&lt;h2&gt;
  
  
  Demo and Project
&lt;/h2&gt;

&lt;p&gt;You can see a demo here:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fprql9grs8ayg8ycbray8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fprql9grs8ayg8ycbray8.png" alt=" " width="800" height="535"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Live demo:&lt;br&gt;
&lt;a href="http://demo.krawlme.com" rel="noopener noreferrer"&gt;http://demo.krawlme.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Dashboard:&lt;br&gt;
&lt;a href="http://demo.krawlme.com/das_dashboard" rel="noopener noreferrer"&gt;http://demo.krawlme.com/das_dashboard&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Features
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Spider trap pages with infinite random links to exhaust automated crawlers&lt;/li&gt;
&lt;li&gt;Fake login pages including WordPress, phpMyAdmin, and generic admin panels&lt;/li&gt;
&lt;li&gt;Honeypot paths advertised via &lt;code&gt;robots.txt&lt;/code&gt; to attract scanners&lt;/li&gt;
&lt;li&gt;Realistic fake credentials and secrets&lt;/li&gt;
&lt;li&gt;Optional canary token integration for external alerting&lt;/li&gt;
&lt;li&gt;Real‑time dashboard for monitoring suspicious activity&lt;/li&gt;
&lt;li&gt;JSON‑based wordlists for easy customization&lt;/li&gt;
&lt;li&gt;Random error injection to mimic real server misconfigurations&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Real‑World Results
&lt;/h2&gt;

&lt;p&gt;We've been running a self‑hosted instance of Krawl in a homelab for about two weeks, and the results have been interesting:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A very clear separation between legitimate crawlers (such as Meta and Amazon) and malicious scanners&lt;/li&gt;
&lt;li&gt;Over 350,000 total requests logged&lt;/li&gt;
&lt;li&gt;Many attempts to access sensitive or deceptive paths&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The goal is to make deception realistic enough to fool automated tools, while remaining useful for defenders and researchers who want to detect and blacklist malicious actors.&lt;/p&gt;

&lt;p&gt;If you’re interested in honeypots, web security, or deception‑based defense, I’d love to hear your thoughts or see you contribute :)&lt;/p&gt;

</description>
      <category>security</category>
      <category>selfhosted</category>
      <category>opensource</category>
      <category>webdev</category>
    </item>
  </channel>
</rss>
