Honeypots & Deception for Malware Detection

Task: Malware Detection

Explore 8 curated cybersecurity tools, with 15,161 visitors searching for solutions

Ghost USB Honeypot Logo

Ghost USB Honeypot emulates USB storage devices to detect and analyze malware that spreads via USB without requiring prior threat intelligence.

0
Dolos: SDN Honeypot Logo

An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.

0
YALIH YALIH Logo

A low interaction client honeypot that detects malicious websites using signature, anomaly and pattern matching techniques with automated URL collection and JavaScript analysis capabilities.

0
ThreatWar Honeypot Agent Logo

A honeypot agent for running honeypots with service and data at threatwar.com.

0
SHIVA Spampot Logo

SHIVA: Spam Honeypot with Intelligent Virtual Analyzer for capturing and analyzing spam data.

0
Telnet IoT Honeypot Logo

A Python telnet honeypot that emulates shell environments to capture and analyze IoT malware and botnet binaries through automated detection mechanisms.

0
Ensnare Logo

Ensnare is a Ruby on Rails gem that deploys honey traps and automated responses to detect and interfere with malicious behavior in web applications.

0
Arctic Swallow Logo

A low-interaction honeypot for detecting and analyzing security threats

0