Loading...

Bifrozt is a free Honeypots & Deception tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to Bifrozt, including their key features and shared capabilities.
Fake protocol server simulator supporting 50+ network protocols for deception
Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources.
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
Medium interaction SSH honeypot for logging brute force attacks and shell interactions.
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
Uploader honeypot designed to look like poor website security.
SSH Honeypot written in Go that records commands and IP addresses of attempted logins.
A modified version of OpenSSH deamon forwarding commands to Cowrie for logging brute force attacks and shell interactions.
Fake protocol server simulator supporting 50+ network protocols for deception
Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources.
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
Medium interaction SSH honeypot for logging brute force attacks and shell interactions.
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
SSH Honeypot written in Go that records commands and IP addresses of attempted logins.
A modified version of OpenSSH deamon forwarding commands to Cowrie for logging brute force attacks and shell interactions.
A script for setting up a dionaea and kippo honeypot using Docker images.
Medium interaction SSH Honeypot with multiple virtual hosts and sandboxed filesystems.
A command-line tool for analyzing Cowrie honeypot log files over time, generating statistics and visualizations from local or remote log data.
Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.
A low-interaction SSH honeypot that logs connection attempts, usernames, and passwords without allowing actual login access.
Troje is a honeypot that creates dynamic LXC container environments to attract and monitor attackers while recording their activities and system changes.
PhoneyC is a client-side honeypot that emulates vulnerable web browsers to detect and analyze malicious web content and browser-based exploits.
A network responder supporting various protocols with minimal assumptions on client intentions.
An easy to set up SSH honeypot for logging SSH connections and activity.
A simple honeypot that collects credentials across various protocols
A Python-based honeypot service for SSH, FTP, and Telnet connections
High-interaction SSH honeypot for logging SSH proxy with ongoing development.
A low-interaction SSH honeypot tool for recording authentication attempts.
Fake SSH server that sends push notifications for login attempts
A webapp for displaying statistics about your kippo SSH honeypot.
Syrup is a Go-based SSH honeypot that simulates SSH services with fake shells, session recording, and comprehensive logging to monitor and analyze unauthorized access attempts.
Blacknet is a low interaction SSH multi-head honeypot system with logging capabilities.
Tool for setting up Glutton, a cybersecurity tool for monitoring SSH traffic.
Honey-Pod for SSH that logs username and password tries during brute-force attacks.
A simpler version of a honeypot that looks for connections from external parties and performs a specific action, usually blacklisting.
A low-interaction SSH honeypot written in C that simulates SSH services to capture and log unauthorized access attempts.
Endlessh is an SSH tarpit that traps SSH clients by sending an endless, random SSH banner.
OpenCanary is a multi-protocol network honeypot with low resource requirements and alerting capabilities.
A Docker container that starts a SSH honeypot and reports statistics to the SANS ISC DShield project
HoneyDrive is the premier honeypot Linux distro with over 10 pre-installed honeypot software packages and numerous analysis tools.
The DShield Raspberry Pi Sensor is a tool that turns a Raspberry Pi into a honeypot to collect and submit security logs to the DShield project for analysis.
Cloud-native deception platform deploying dynamic security canaries
AI-powered deception platform using honeypots to detect & disrupt attacks
AI-based deception platform for collecting cyber threat intelligence
Credential-based deception platform that lures attackers to capture stolen creds
AI-powered deception platform for early APT and advanced threat detection
AI-powered deception platform for cloud threat detection using honeytokens
Deception platform using external-facing decoys for threat intel & recon detection
Adversary engagement & deception platform for detecting advanced threats
AI-driven deception platform using honeypots and decoys to detect threats.
Common questions security professionals ask when evaluating alternatives and competitors to Bifrozt.
The most popular alternatives to Bifrozt include fofapro fapro, Deception-as-Detection, Project Artillery, Hudinx, and ssh-auth-logger. These Honeypots & Deception tools offer similar capabilities and are frequently compared by security professionals evaluating their options.