Loading...
Honeypots and cyber deception solution that simulate vulnerable systems to detect, divert, and analyze attacker activities in real time.
Browse 214 honeypots & deception tools
A Flask-based honeypot that simulates Outlook Web App (OWA) environments to attract and analyze malicious activities targeting OWA systems.
A configurable DNS honeypot with SQLite logging and Docker support.
An easy to set up SSH honeypot for logging SSH connections and activity.
A network responder supporting various protocols with minimal assumptions on client intentions.
A honeypot system designed to detect and analyze potential security threats
A low-interaction honeypot for detecting and analyzing potential attacks on Android devices via ADB over TCP/IP
An extensible and open-source system for running, monitoring, and managing honeypots with advanced features.
PhoneyC is a client-side honeypot that emulates vulnerable web browsers to detect and analyze malicious web content and browser-based exploits.
Ghost USB Honeypot emulates USB storage devices to detect and analyze malware that spreads via USB without requiring prior threat intelligence.
A Splunk application that processes honeypot data from hpfeeds channels to generate clustered meta-events and visualizations for security analysis.
A honeypot mimicking Tomcat manager endpoints to log requests and save attacker's WAR files for analysis.
BW-Pot is an interactive web application honeypot that deploys vulnerable applications to attract and monitor HTTP/HTTPS attacks, with automated logging to Google BigQuery for analysis.
A printer honeypot PoC that simulates a printer on a network to detect and analyze potential attackers.
A web honeypot tool for detecting and monitoring potential attacks on phpMyAdmin installations.
Honeyntp is an NTP honeypot and logging tool that captures NTP packets into a Redis database to detect DDoS attacks and monitor network time protocol traffic.
Web application for visualizing live GPS locations on an SVG world map using honeypot captures.
Script for turning a Raspberry Pi into a Honey Pot Pi with various monitoring and logging capabilities.
WordPress plugin to reduce comment spam with a smarter honeypot.
PHP Script demonstrating a smart honey pot for email form protection.
A low to medium interaction honeypot with a variety of plugins for cybersecurity monitoring.
A honeypot trap for Symfony2 forms to reduce spam submissions.
Troje is a honeypot that creates dynamic LXC container environments to attract and monitor attackers while recording their activities and system changes.
Common questions about Honeypots & Deception tools, selection guides, pricing, and comparisons.
Honeypots deploy fake assets (servers, credentials, files, database records) that appear legitimate but have no production purpose. Any interaction with them is inherently suspicious, providing high-fidelity alerts with virtually zero false positives. Modern deception platforms deploy thousands of breadcrumbs and decoys across your environment, detecting lateral movement, credential theft, and reconnaissance that other tools miss.