Honeypots & Deception
Browse 20 cybersecurity tools tagged with "Honeypots & Deception"

Monkey-Spider
Security Operations
Monkey-Spider on SecurityListing: A crawler-based low-interaction client honeypot for exposing website threats.

Honeyd Tools
Security Operations
Honeyd Tools on SecurityListing: A collection of tools that can be used with Honeyd for data analysis or other purposes

Intrusion Detection Honeypots
Network Security
Intrusion Detection Honeypots on SecurityListing: A foundational guide for using deception against computer network adversaries using honeypots to detect adversaries before they accomplish their goals.

Capsicum
Container Security
Capsicum on SecurityListing: A security framework for process isolation and sandboxing based on capability-based security principles.

Impost
Network Security
Impost on SecurityListing: Impost is a powerful network security auditing tool with honey pot and packet sniffer capabilities.

LaBrea
Penetration Testing
LaBrea on SecurityListing: LaBrea is a 'sticky' honeypot and IDS tool that traps malicious actors by creating virtual servers on unused IP addresses.

HoneyView
Security Operations
HoneyView on SecurityListing: HoneyView is a tool for analyzing honeyd logfiles graphically and textually.

Bait and Switch
Security Operations
Bait and Switch Honeypot on SecurityListing: An active and aggressive honeypot tool for network security.

KFSensor
Penetration Testing
KFSensor on SecurityListing: KFSensor is an advanced Windows honeypot system for detecting hackers and worms by simulating vulnerable system services.

HoneyDrive
Security Operations
HoneyDrive on SecurityListing: HoneyDrive is the premier honeypot Linux distro with over 10 pre-installed honeypot software packages and numerous analysis tools.

HIHAT - High
Threat Intelligence Platforms
HIHAT - High Interaction Honeypot Analysis Toolkit on SecurityListing: A toolkit that transforms PHP applications into web-based high-interaction Honeypots for monitoring and analyzing attacks.

GHH - Google
Security Operations
GHH - Google Hack Honeypot on SecurityListing: GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

Bifrozt
Security Operations
Bifrozt on SecurityListing: High interaction honeypot solution for Linux systems with data control and integrity features.

HoneyDB
Threat Hunting
HoneyDB on SecurityListing: HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.

Honeybrid
Network Security
Honeybrid on SecurityListing: A hybrid honeypot framework that combines low and high interaction honeypots for network security

Guardpot AI-Powered Cyber
Threat Intelligence Platforms
Guardpot AI-Powered Cyber Deception on SecurityListing: AI-powered deception platform using honeypots to detect & disrupt attacks

Kojoney
Security Operations
Kojoney on SecurityListing: A honeypot for the SSH Service

Project Honey Pot
Security Operations
Project Honey Pot on SecurityListing: The Web's Largest Community Tracking Online Fraud & Abuse

Tracebit Dynamic Security
Cloud Security
Tracebit Dynamic Security Canaries on SecurityListing: Cloud-native deception platform deploying dynamic security canaries

SCADA HoneyNet Project
Network Security
SCADA HoneyNet Project on SecurityListing: Building Honeypots for Industrial Networks using Honeyd and simulating SCADA, DCS, and PLC architectures.