Deception technologies and honeypot solutions for detecting and analyzing potential cyber threats. Task: GraphExplore 1 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
cowrie2neo parses Cowrie honeypot logs and imports the data into Neo4j databases for graph-based analysis and visualization of honeypot interactions.