Honeypots & Deception

Honeypots and cyber deception solution that simulate vulnerable systems to detect, divert, and analyze attacker activities in real time.

Explore 191 curated cybersecurity tools, with 14,630+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Guardpot Honeypots Logo

Deception platform using honeypots to detect and analyze network threats

0
Tracebit Logo

A security platform that automates the deployment and management of security canaries across cloud infrastructure to detect potential intrusions and unauthorized access.

1
Trapster Community Logo

A low-interaction honeypot that simulates network services to detect and monitor potential intrusion attempts on internal networks.

0
DShield Raspberry Pi Sensor Logo

The DShield Raspberry Pi Sensor is a tool that turns a Raspberry Pi into a honeypot to collect and submit security logs to the DShield project for analysis.

0
Manuka by SpaceRaccoon Logo

An open-source OSINT honeypot that monitors threat actor reconnaissance attempts and generates early-warning intelligence for blue teams during the pre-attack phase.

0
honeydet Logo

A signature-based, multi-threaded honeypot detection tool written in Golang that identifies honeypots through crafted requests and response analysis.

1
HoneyFS Logo

HoneyFS is an LLM-powered honeypot tool that generates realistic fake file systems using GPT-3.5 to deceive attackers and enhance security analysis.

0
gohoney Logo

SSH Honeypot written in Go that records commands and IP addresses of attempted logins.

0
Bait and Switch Honeypot Logo

An active and aggressive honeypot tool for network security.

0
MTPot Logo

Open-source honeypot tool for detecting and analyzing malicious activities in the Apache Struts exploit.

0
Acapulco (Attack Community grAPh COnstruction) Logo

A Splunk application that processes honeypot data from hpfeeds channels to generate clustered meta-events and visualizations for security analysis.

0
Kako Logo

A project providing honeypots for embedded device vulnerabilities with support for AWS integration and JSON output.

0
Stack Honeypot Logo

A PHP port of Rack::Honeypot, a spam trap that detects and blocks spambots

0
Project Honey Pot Logo

The Web's Largest Community Tracking Online Fraud & Abuse

0
WAPot Logo

A honeypot that emulates a Belkin N300 Home Wireless router with default setup to observe traffic

0
DionaeaFR Logo

A low-interaction honeypot that uses Dionaea as its core, providing a simple and easy-to-use interface for setting up and managing honeypots.

0
DNS Honeypot - UDPot Logo

A configurable DNS honeypot with SQLite logging and Docker support.

0
Blacknet Logo

Blacknet is a low interaction SSH multi-head honeypot system with logging capabilities.

0
HoneySMB Logo

A high-interaction honeypot solution for detecting and analyzing SMB-based attacks

0
Honeytrap by Honeytrap Logo

An extensible and open-source system for running, monitoring, and managing honeypots with advanced features.

0
Express Honeypot Logo

A honeypot for remote file inclusion (RFI) and local file inclusion (LFI) using fake URLs to catch scanning bots and malwares.

0
GridPot Logo

GridPot is a honeypot framework that combines GridLAB-D, Conpot, and libiec61850 to simulate industrial control systems and detect attacks on power grid infrastructure.

0
IMAP-Honey Logo

IMAP-Honey is a honeypot tool for IMAP and SMTP protocols with support for logging to console or syslog.

0
HoneyView Logo

HoneyView is a tool for analyzing honeyd logfiles graphically and textually.

0