Product Hunt Launch!CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

Honeypots & Deception

Honeypots and cyber deception solution that simulate vulnerable systems to detect, divert, and analyze attacker activities in real time.

Explore 191 curated cybersecurity tools, with 16,525+ visitors searching for solutions

CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
HoneyDB Logo

HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.

0
AMT Honeypot Logo

A Go-based honeypot that mimics Intel's AMT management service to detect and log exploitation attempts targeting the CVE-2017-5689 firmware vulnerability.

0
FaPro Free Logo

A Fake Protocol Server tool with support for multiple network services and protocols.

0
Glastopf Analytics Logo

A Python web application that provides statistical analysis and visualization for Glastopf honeypot data by connecting to the honeypot's SQLite database.

0
Mailoney Logo

SMTP Honeypot with custom modules for different modes of operation.

0
Twisted Honeypots Logo

A Python-based honeypot service for SSH, FTP, and Telnet connections

0
LaBrea Logo

LaBrea is a 'sticky' honeypot and IDS tool that traps malicious actors by creating virtual servers on unused IP addresses.

0
django-kippo Logo

Django App for the SSH Honeypot called 'kippo'

0
Ghost USB Honeypot Logo

Ghost USB Honeypot emulates USB storage devices to detect and analyze malware that spreads via USB without requiring prior threat intelligence.

0
Drupot Logo

A honeypot installation for Drupal that supports Go modules and mimics different versions of Drupal.

0
Troje Logo

Troje is a honeypot that creates dynamic LXC container environments to attract and monitor attackers while recording their activities and system changes.

0
MushMush Foundation Logo

Non-profit organization supporting the advancement of open source software.

0
ssh-auth-logger Logo

A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.

0
Glutton Setup Logo

Tool for setting up Glutton, a cybersecurity tool for monitoring SSH traffic.

0
T-Pot 17.10 Logo

Multi-honeypot platform with various honeypots and monitoring tools.

0
Impost Logo

Impost is a powerful network security auditing tool with honey pot and packet sniffer capabilities.

0
Syrup Logo

Syrup is a Go-based SSH honeypot that simulates SSH services with fake shells, session recording, and comprehensive logging to monitor and analyze unauthorized access attempts.

0
SSHHiPot Logo

High-interaction SSH honeypot for logging SSH proxy with ongoing development.

0
Honeyku Logo

Create and monitor fake HTTP endpoints automatically with Honeyku, deployable on Heroku or your own server.

0
StrutsHoneypot Logo

An Apache 2 based honeypot with detection capabilities specifically designed to identify and analyze Struts CVE-2017-5638 exploitation attempts.

0
T-Pot - The All In One Multi Honeypot Platform Logo

A multiarch honeypot platform supporting 20+ honeypots and offering visualization options and security tools.

0
Dolos: SDN Honeypot Logo

An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.

0
OFPOT OpenFlow HoneyPot Logo

An OpenFlow honeypot that detects unused IP addresses and simulates network traffic to attract and analyze potential threats

0
RedisHoneyPot Logo

A high-interaction honeypot system supporting the Redis protocol.

0

Honeypots & Deception Tools - FAQ

Common questions about Honeypots & Deception tools including selection guides, pricing, and comparisons.

Honeypots and cyber deception solution that simulate vulnerable systems to detect, divert, and analyze attacker activities in real time.

Have more questions? Browse our categories or search for specific tools.