Deception technologies and honeypot solutions for detecting and analyzing potential cyber threats. Task: Blue TeamExplore 11 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
An Open-source intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue Teamers.
An LLM-based honeypot file system creator that generates realistic file systems and configurations to lure attackers and improve analyst engagement.
A low Interaction Client honeypot designed to detect malicious websites through signature, anomaly and pattern matching techniques.
RDP based Honeypot that creates virtual machines for incoming connections and analyzes traffic with Suricata.
A basic Flask-based Outlook Web App (OWA) honeypot for cybersecurity experimentation.
A basic Flask-based Outlook Web App (OWA) honeypot for cybersecurity experimentation.
Ansible role for deploying and managing Bifrozt honeypots
GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.
GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.