Network Security for Honeypot
Comprehensive solutions for securing network infrastructure, traffic, and communications. Task: Honeypot
Explore 17 curated tools and resources
RELATED TASKS
LATEST ADDITIONS
A honeypot that emulates a Belkin N300 Home Wireless router with default setup to observe traffic
A script for extracting network metadata and fingerprints such as JA3 and HASSH from packet capture files or live network traffic.
A foundational guide for using deception against computer network adversaries using honeypots to detect adversaries before they accomplish their goals.
A honeypot designed to detect and analyze malicious activities in instant messaging platforms.
A honeypot system designed to detect and analyze potential security threats
A low-interaction honeypot for detecting and analyzing potential attacks on Android devices via ADB over TCP/IP
A simple Docker-based honeypot to detect port scanning
Automated signature creation using honeypots for network intrusion detection systems.
A honeypot that logs NTP packets into a Redis database to detect DDoS attempts.
A low interaction Python honeypot designed to mimic various services and ports to attract attackers and log access attempts.
A Docker container that starts a SSH honeypot and reports statistics to the SANS ISC DShield project
A simple honeypot that opens a listening socket and waits for connection attempts, with configurable reply and event handling
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.