Honeypots & Deception

Honeypots and cyber deception solution that simulate vulnerable systems to detect, divert, and analyze attacker activities in real time.

Explore 191 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
HoneyDrive Logo

HoneyDrive is the premier honeypot Linux distro with over 10 pre-installed honeypot software packages and numerous analysis tools.

0
Honepot for CVE-2019-19781 Logo

A honeypot tool to detect and log CVE-2019-19781 scan and exploitation attempts.

0
Toms Honey Pot Logo

A honeypot system designed to detect and analyze potential security threats

0
DemonHunter Logo

Distributed low interaction honeypot with Agent/Master design supporting various protocol handlers.

0
sshesame Logo

An easy to set up SSH honeypot for logging SSH connections and activity.

0
Cisco ASA Honeypot Logo

A low interaction honeypot for detecting CVE-2018-0101 vulnerability in Cisco ASA component.

0
django-admin-honeypot Logo

A fake Django admin login screen to detect and notify admins of attempted unauthorized access

0
Bluepot Logo

A Java-based Bluetooth honeypot that captures and analyzes malware and attacks targeting Bluetooth-enabled devices.

0
Project Artillery Logo

A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.

0
Honeypot Daemon (potd) Logo

A honeypot daemon project for processing, filtering, and redirecting incoming traffic to a sandbox environment.

0
YALIH YALIH Logo

A low interaction client honeypot that detects malicious websites using signature, anomaly and pattern matching techniques with automated URL collection and JavaScript analysis capabilities.

0
Log4Pot Logo

A honeypot specifically designed to detect and capture Log4Shell vulnerability exploitation attempts with payload analysis and flexible logging capabilities.

0
Monkey-Spider Logo

A crawler-based low-interaction client honeypot for exposing website threats.

0
Sticky Elephant Logo

A medium-interaction PostgreSQL honeypot with configurable settings

0
SSHoney Logo

SSHoney is an SSH honeypot for logging SSH connection attempts.

0
NoSQL-Honeypot-Framework (NoPo) Logo

An open source honeypot for NoSQL databases with support for Redis and additional features for detecting attackers and logging attack incidents.

0
Dionaea Honeypot on EC2 in 20 minutes Logo

A tutorial on setting up Dionaea on an EC2 instance in 20 minutes

0
sshd-honeypot Logo

A modified version of OpenSSH deamon forwarding commands to Cowrie for logging brute force attacks and shell interactions.

0
ThreatWar Honeypot Agent Logo

A honeypot agent for running honeypots with service and data at threatwar.com.

0
Hornet Logo

Medium interaction SSH Honeypot with multiple virtual hosts and sandboxed filesystems.

0
Deception-as-Detection Logo

Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources.

0
Kippo Stats Logo

A webapp for displaying statistics about your kippo SSH honeypot.

0
smart-honeypot PHP Script Logo

PHP Script demonstrating a smart honey pot for email form protection.

0
DCEPT Logo

A honeytoken-based tripwire for Microsoft's Active Directory to detect privilege escalation attempts

0

Honeypots & Deception Tools - FAQ

Common questions about Honeypots & Deception tools including selection guides, pricing, and comparisons.

Honeypots and cyber deception solution that simulate vulnerable systems to detect, divert, and analyze attacker activities in real time.

Have more questions? Browse our categories or search for specific tools.