Deception technologies and honeypot solutions for detecting and analyzing potential cyber threats. Task: Security ResearchExplore 8 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A list of services and how to claim (sub)domains with dangling DNS records.
A list of services and how to claim (sub)domains with dangling DNS records.
A powerful tool for finding and exploiting subdomain takeover vulnerabilities
A tool to bypass Content Security Policy (CSP) restrictions
Medium interaction SSH Honeypot with multiple virtual hosts and sandboxed filesystems.
An open-source Python software for creating honeypots and honeynets securely.
An open-source Python software for creating honeypots and honeynets securely.
An observation camera honeypot for proof-of-concept purposes