Loading...
Task: Http
Explore 9 curated cybersecurity tools, with 16,024+ visitors searching for solutions
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to accelerate sales and compliance
Feature your product and reach thousands of professionals.
Helix is a versatile honeypot designed to mimic the behavior of various protocols including Kubernetes API server, HTTP, TCP, and UDP.
Helix is a versatile honeypot designed to mimic the behavior of various protocols including Kubernetes API server, HTTP, TCP, and UDP.
A simple honeypot that collects credentials across various protocols
TANNER is a remote data analysis service that evaluates HTTP requests and generates responses for SNARE honeypots while emulating application vulnerabilities.
TANNER is a remote data analysis service that evaluates HTTP requests and generates responses for SNARE honeypots while emulating application vulnerabilities.
Galah is an LLM-powered web honeypot that mimics various web applications by dynamically responding to HTTP requests.
Galah is an LLM-powered web honeypot that mimics various web applications by dynamically responding to HTTP requests.
Cross-platform HTTP honeypot that traps bots with infinite data streams
Cross-platform HTTP honeypot that traps bots with infinite data streams
bap is a webservice honeypot that logs HTTP basic authentication credentials.
bap is a webservice honeypot that logs HTTP basic authentication credentials.
Python-based web server framework for setting up fake web servers and services with precise data responses.
Python-based web server framework for setting up fake web servers and services with precise data responses.
Honeypot tool with bug-catching capabilities and support for multiple protocols.
Honeypot tool with bug-catching capabilities and support for multiple protocols.
A network responder supporting various protocols with minimal assumptions on client intentions.
A network responder supporting various protocols with minimal assumptions on client intentions.
Get the latest cybersecurity updates in your inbox
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to accelerate sales and compliance