Loading...
Honeypots and cyber deception solution that simulate vulnerable systems to detect, divert, and analyze attacker activities in real time.
Browse 214 honeypots & deception tools
AI-powered deception platform for cloud threat detection using honeytokens
AI-powered deception platform for early APT and advanced threat detection
Credential-based deception platform that lures attackers to capture stolen creds
AI-based deception platform for collecting cyber threat intelligence
AI-powered deception platform using honeypots to detect & disrupt attacks
Cloud-native deception platform deploying dynamic security canaries
A low-interaction honeypot that simulates network services to detect intrusion attempts
Cross-platform HTTP honeypot that traps bots with infinite data streams
A signature-based, multi-threaded honeypot detection tool written in Golang that identifies honeypots through crafted requests and response analysis.
TANNER is a remote data analysis service that evaluates HTTP requests and generates responses for SNARE honeypots while emulating application vulnerabilities.
Fake protocol server simulator supporting 50+ network protocols for deception
The DShield Raspberry Pi Sensor is a tool that turns a Raspberry Pi into a honeypot to collect and submit security logs to the DShield project for analysis.
A security framework for process isolation and sandboxing based on capability-based security principles.
KFSensor is an advanced Windows honeypot system for detecting hackers and worms by simulating vulnerable system services.
A collection of tools that can be used with Honeyd for data analysis or other purposes
High interaction honeypot solution for Linux systems with data control and integrity features.
Building Honeypots for Industrial Networks using Honeyd and simulating SCADA, DCS, and PLC architectures.
A crawler-based low-interaction client honeypot for exposing website threats.
LaBrea is a 'sticky' honeypot and IDS tool that traps malicious actors by creating virtual servers on unused IP addresses.
Impost is a powerful network security auditing tool with honey pot and packet sniffer capabilities.
HoneyView is a tool for analyzing honeyd logfiles graphically and textually.
A hybrid honeypot framework that combines low and high interaction honeypots for network security
Common questions about Honeypots & Deception tools, selection guides, pricing, and comparisons.
Honeypots deploy fake assets (servers, credentials, files, database records) that appear legitimate but have no production purpose. Any interaction with them is inherently suspicious, providing high-fidelity alerts with virtually zero false positives. Modern deception platforms deploy thousands of breadcrumbs and decoys across your environment, detecting lateral movement, credential theft, and reconnaissance that other tools miss.
Based on user ratings and community engagement on CybersecTools, the top-rated Honeypots & Deception tools are:
Yes. Out of 24 honeypots & deception tools listed on CybersecTools, 18 are free and 6 are commercial. Free tools work well for small teams, testing, and budget-conscious organizations. Commercial tools typically add enterprise features, dedicated support, and SLA guarantees.