Deception technologies and honeypot solutions for detecting and analyzing potential cyber threats. Task: JavaExplore 3 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A honeypot mimicking Tomcat manager endpoints to log requests and save attacker's WAR files for analysis.
A honeypot mimicking Tomcat manager endpoints to log requests and save attacker's WAR files for analysis.