Honeypots & Deception for Cybersecurity

Task: Cybersecurity

Explore 7 curated cybersecurity tools, with 14,519+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Acapulco (Attack Community grAPh COnstruction) Logo

A Splunk application that processes honeypot data from hpfeeds channels to generate clustered meta-events and visualizations for security analysis.

0
Project Honey Pot Logo

The Web's Largest Community Tracking Online Fraud & Abuse

0
Bluepot Logo

A Java-based Bluetooth honeypot that captures and analyzes malware and attacks targeting Bluetooth-enabled devices.

0
OWA Honeypot Logo

A Flask-based honeypot that simulates Outlook Web App (OWA) environments to attract and analyze malicious activities targeting OWA systems.

0
HpfeedsHoneyGraph Logo

HpfeedsHoneyGraph is a visualization application that creates graphical representations of hpfeeds logs to aid cybersecurity analysis of honeypot data.

0
SCADA HoneyNet Project Logo

Building Honeypots for Industrial Networks using Honeyd and simulating SCADA, DCS, and PLC architectures.

0
Honeycomb Plugins Logo

A plugin repository that extends the Honeycomb honeypot framework with additional features and capabilities for enhanced threat detection and analysis.

0