search
Join or Log In

Honeypots & Deception

Browse 20 cybersecurity tools tagged with "Honeypots & Deception"

Monkey-Spider

Monkey-Spider

language

Security Operations

Monkey-Spider on SecurityListing: A crawler-based low-interaction client honeypot for exposing website threats.

4.8(3)
Honeyd Tools

Honeyd Tools

language

Security Operations

Honeyd Tools on SecurityListing: A collection of tools that can be used with Honeyd for data analysis or other purposes

4.7(2)
Intrusion Detection Honeypots

Intrusion Detection Honeypots

language

Network Security

Intrusion Detection Honeypots on SecurityListing: A foundational guide for using deception against computer network adversaries using honeypots to detect adversaries before they accomplish their goals.

4.7(2)
Capsicum

Capsicum

language

Container Security

Capsicum on SecurityListing: A security framework for process isolation and sandboxing based on capability-based security principles.

4.5(3)
Impost

Impost

language

Network Security

Impost on SecurityListing: Impost is a powerful network security auditing tool with honey pot and packet sniffer capabilities.

4.5(1)
LaBrea

LaBrea

language

Penetration Testing

LaBrea on SecurityListing: LaBrea is a 'sticky' honeypot and IDS tool that traps malicious actors by creating virtual servers on unused IP addresses.

4.5(1)
HoneyView

HoneyView

language

Security Operations

HoneyView on SecurityListing: HoneyView is a tool for analyzing honeyd logfiles graphically and textually.

4.5(1)
Bait and Switch Honeypot

Bait and Switch

language

Security Operations

Bait and Switch Honeypot on SecurityListing: An active and aggressive honeypot tool for network security.

4.5(1)
KFSensor

KFSensor

language

Penetration Testing

KFSensor on SecurityListing: KFSensor is an advanced Windows honeypot system for detecting hackers and worms by simulating vulnerable system services.

4.5(1)
HoneyDrive

HoneyDrive

language

Security Operations

HoneyDrive on SecurityListing: HoneyDrive is the premier honeypot Linux distro with over 10 pre-installed honeypot software packages and numerous analysis tools.

4.5(1)
HIHAT - High Interaction Honeypot Analysis Toolkit

HIHAT - High

language

Threat Intelligence Platforms

HIHAT - High Interaction Honeypot Analysis Toolkit on SecurityListing: A toolkit that transforms PHP applications into web-based high-interaction Honeypots for monitoring and analyzing attacks.

4.5(1)
GHH - Google Hack Honeypot

GHH - Google

language

Security Operations

GHH - Google Hack Honeypot on SecurityListing: GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

4.5(1)
Bifrozt

Bifrozt

language

Security Operations

Bifrozt on SecurityListing: High interaction honeypot solution for Linux systems with data control and integrity features.

4.5(1)
HoneyDB

HoneyDB

language

Threat Hunting

HoneyDB on SecurityListing: HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.

4.5(1)
Honeybrid

Honeybrid

language

Network Security

Honeybrid on SecurityListing: A hybrid honeypot framework that combines low and high interaction honeypots for network security

3.8(1)
Guardpot AI-Powered Cyber Deception

Guardpot AI-Powered Cyber

language

Threat Intelligence Platforms

Guardpot AI-Powered Cyber Deception on SecurityListing: AI-powered deception platform using honeypots to detect & disrupt attacks

3.8(1)
Kojoney

Kojoney

language

Security Operations

Kojoney on SecurityListing: A honeypot for the SSH Service

3.8(1)
Project Honey Pot

Project Honey Pot

language

Security Operations

Project Honey Pot on SecurityListing: The Web's Largest Community Tracking Online Fraud & Abuse

Tracebit Dynamic Security Canaries

Tracebit Dynamic Security

language

Cloud Security

Tracebit Dynamic Security Canaries on SecurityListing: Cloud-native deception platform deploying dynamic security canaries

SCADA HoneyNet Project

SCADA HoneyNet Project

language

Network Security

SCADA HoneyNet Project on SecurityListing: Building Honeypots for Industrial Networks using Honeyd and simulating SCADA, DCS, and PLC architectures.