Deception technologies and honeypot solutions for detecting and analyzing potential cyber threats. Task: AwsExplore 2 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
A tutorial on setting up Dionaea on an EC2 instance in 20 minutes