Göbel, JanFreiling, Felix C.2019-01-172019-01-172010978-3-88579-264-2https://dl.gi.de/handle/20.500.12116/19780This paper describes the low-interaction server honeypot Amun. Through the use of emulated vulnerabilities Amun aims at capturing malware in an automated fashion. The use of the scriping language Python, a modular design, and the possibility to write vulnerability modules in XML allow the honeypot to be easily maintained and extended to personal needs.enAmun: automatic capturing of malicious softwareText/Conference Paper1617-5468