Loading...
Task: Honeypot
Browse 185 security tools
Active Directory deception technology for threat detection and response
Active Directory deception technology for threat detection and response
Real-time ransomware attack deflection through deception and diversion
Real-time ransomware attack deflection through deception and diversion
AI-powered fraud prevention using bots to engage scammers and extract intel
AI-powered fraud prevention using bots to engage scammers and extract intel
Crowd-sourced honeynet providing real-time threat intelligence and protection
Crowd-sourced honeynet providing real-time threat intelligence and protection
AI-driven deception tech creating cyber clones to trap attackers & detect threats
AI-driven deception tech creating cyber clones to trap attackers & detect threats
Deception platform that diverts attackers & provides threat intelligence
Deception platform that diverts attackers & provides threat intelligence
AI-driven deception platform using honeypots and decoys to detect threats.
AI-driven deception platform using honeypots and decoys to detect threats.
Deception platform using external-facing decoys for threat intel & recon detection
Deception platform using external-facing decoys for threat intel & recon detection
AI-powered deception platform for cloud threat detection using honeytokens
AI-powered deception platform for cloud threat detection using honeytokens
Deception-based ITDR platform for identity threat detection and response
Deception-based ITDR platform for identity threat detection and response
AI-powered deception platform for early APT and advanced threat detection
AI-powered deception platform for early APT and advanced threat detection
Credential-based deception platform that lures attackers to capture stolen creds
Credential-based deception platform that lures attackers to capture stolen creds
AI-based deception platform for collecting cyber threat intelligence
AI-based deception platform for collecting cyber threat intelligence
Deception-based detection engine integrated into LMNTRIX XDR platform
Deception-based detection engine integrated into LMNTRIX XDR platform
AI-powered deception platform using honeypots to detect & disrupt attacks
AI-powered deception platform using honeypots to detect & disrupt attacks
Cloud-native deception platform deploying dynamic security canaries
Cloud-native deception platform deploying dynamic security canaries
A low-interaction honeypot that simulates network services to detect and monitor potential intrusion attempts on internal networks.
A low-interaction honeypot that simulates network services to detect and monitor potential intrusion attempts on internal networks.
The DShield Raspberry Pi Sensor is a tool that turns a Raspberry Pi into a honeypot to collect and submit security logs to the DShield project for analysis.
The DShield Raspberry Pi Sensor is a tool that turns a Raspberry Pi into a honeypot to collect and submit security logs to the DShield project for analysis.
An open-source OSINT honeypot that monitors threat actor reconnaissance attempts and generates early-warning intelligence for blue teams during the pre-attack phase.
An open-source OSINT honeypot that monitors threat actor reconnaissance attempts and generates early-warning intelligence for blue teams during the pre-attack phase.
A signature-based, multi-threaded honeypot detection tool written in Golang that identifies honeypots through crafted requests and response analysis.
A signature-based, multi-threaded honeypot detection tool written in Golang that identifies honeypots through crafted requests and response analysis.
HoneyFS is an LLM-powered honeypot tool that generates realistic fake file systems using GPT-3.5 to deceive attackers and enhance security analysis.
HoneyFS is an LLM-powered honeypot tool that generates realistic fake file systems using GPT-3.5 to deceive attackers and enhance security analysis.
An active and aggressive honeypot tool for network security.
An active and aggressive honeypot tool for network security.
Open-source honeypot tool for detecting and analyzing malicious activities in the Apache Struts exploit.
Open-source honeypot tool for detecting and analyzing malicious activities in the Apache Struts exploit.
A Splunk application that processes honeypot data from hpfeeds channels to generate clustered meta-events and visualizations for security analysis.
A Splunk application that processes honeypot data from hpfeeds channels to generate clustered meta-events and visualizations for security analysis.
Get strategic cybersecurity insights in your inbox
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs