
Hornet is a free Honeypots & Deception tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to Hornet, including their key features and shared capabilities.
Deception-based breach detection tools including honeypots & canary tokens.
Fake protocol server simulator supporting 50+ network protocols for deception
Open-source nonprofit org developing honeypot tools & threat research.
Medium interaction SSH honeypot for logging brute force attacks and shell interactions.
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
An open-source Python software for creating honeypots and honeynets securely.
SSH Honeypot written in Go that records commands and IP addresses of attempted logins.
An observation camera honeypot for proof-of-concept purposes
Deception-based breach detection tools including honeypots & canary tokens.
Fake protocol server simulator supporting 50+ network protocols for deception
Open-source nonprofit org developing honeypot tools & threat research.
Medium interaction SSH honeypot for logging brute force attacks and shell interactions.
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
An open-source Python software for creating honeypots and honeynets securely.
SSH Honeypot written in Go that records commands and IP addresses of attempted logins.
An observation camera honeypot for proof-of-concept purposes
A modified version of OpenSSH deamon forwarding commands to Cowrie for logging brute force attacks and shell interactions.
A Java-based Bluetooth honeypot that captures and analyzes malware and attacks targeting Bluetooth-enabled devices.
A script for setting up a dionaea and kippo honeypot using Docker images.
A command-line tool for analyzing Cowrie honeypot log files over time, generating statistics and visualizations from local or remote log data.
Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.
A low-interaction SSH honeypot that logs connection attempts, usernames, and passwords without allowing actual login access.
Troje is a honeypot that creates dynamic LXC container environments to attract and monitor attackers while recording their activities and system changes.
A low-interaction honeypot for detecting and analyzing potential attacks on Android devices via ADB over TCP/IP
A network responder supporting various protocols with minimal assumptions on client intentions.
An easy to set up SSH honeypot for logging SSH connections and activity.
A simple honeypot that collects credentials across various protocols
A Python-based honeypot service for SSH, FTP, and Telnet connections
High-interaction SSH honeypot for logging SSH proxy with ongoing development.
A low-interaction SSH honeypot tool for recording authentication attempts.
Fake SSH server that sends push notifications for login attempts
A webapp for displaying statistics about your kippo SSH honeypot.
Syrup is a Go-based SSH honeypot that simulates SSH services with fake shells, session recording, and comprehensive logging to monitor and analyze unauthorized access attempts.
Blacknet is a low interaction SSH multi-head honeypot system with logging capabilities.
Tool for setting up Glutton, a cybersecurity tool for monitoring SSH traffic.
Honey-Pod for SSH that logs username and password tries during brute-force attacks.
HoneyFS is an LLM-powered honeypot tool that generates realistic fake file systems using GPT-3.5 to deceive attackers and enhance security analysis.
A low-interaction SSH honeypot written in C that simulates SSH services to capture and log unauthorized access attempts.
GridPot is a honeypot framework that combines GridLAB-D, Conpot, and libiec61850 to simulate industrial control systems and detect attacks on power grid infrastructure.
Endlessh is an SSH tarpit that traps SSH clients by sending an endless, random SSH banner.
cowrie2neo parses Cowrie honeypot logs and imports the data into Neo4j databases for graph-based analysis and visualization of honeypot interactions.
A Docker container that starts a SSH honeypot and reports statistics to the SANS ISC DShield project
High interaction honeypot solution for Linux systems with data control and integrity features.
The DShield Raspberry Pi Sensor is a tool that turns a Raspberry Pi into a honeypot to collect and submit security logs to the DShield project for analysis.
Cloud-native deception platform deploying dynamic security canaries
AI-powered deception platform using honeypots to detect & disrupt attacks
AI-based deception platform for collecting cyber threat intelligence
Credential-based deception platform that lures attackers to capture stolen creds
AI-powered deception platform for early APT and advanced threat detection
AI-powered deception platform for cloud threat detection using honeytokens
Deception platform using external-facing decoys for threat intel & recon detection
Common questions security professionals ask when evaluating alternatives and competitors to Hornet.
The most popular alternatives to Hornet include Thinkst Applied Research, fofapro fapro, The Honeynet Project, Hudinx, and ssh-auth-logger. These Honeypots & Deception tools offer similar capabilities and are frequently compared by security professionals evaluating their options.