Loading...
Browse 23 deception tools
AI-based deception platform for collecting cyber threat intelligence
AI-based deception platform for collecting cyber threat intelligence
AI-driven SOAR platform with threat intel, deception, and leak detection
AI-driven SOAR platform with threat intel, deception, and leak detection
AI-driven cyber intelligence orchestration platform for threat intel & OSINT
AI-driven cyber intelligence orchestration platform for threat intel & OSINT
24/7 managed SOC service with monitoring, protection, and incident response
24/7 managed SOC service with monitoring, protection, and incident response
AI-driven identity threat detection and response for AD, Azure AD, and hybrid
AI-driven identity threat detection and response for AD, Azure AD, and hybrid
Deception-based detection engine integrated into LMNTRIX XDR platform
Deception-based detection engine integrated into LMNTRIX XDR platform
External threat landscape mgmt platform with predictive intelligence
External threat landscape mgmt platform with predictive intelligence
AI-powered NGFW with integrated WAF, threat detection, and SOC Lite
AI-powered NGFW with integrated WAF, threat detection, and SOC Lite
Real-time threat intel platform detecting malicious scanning & exploitation
Real-time threat intel platform detecting malicious scanning & exploitation
Managed SOC service with XDR capabilities for 24/7 threat monitoring and response
Managed SOC service with XDR capabilities for 24/7 threat monitoring and response
XDR platform with MDR and SOCaaS for threat detection and response
XDR platform with MDR and SOCaaS for threat detection and response
XDR platform with NDR, EDR, deception, AD security, and CNAPP capabilities
XDR platform with NDR, EDR, deception, AD security, and CNAPP capabilities
Identity threat detection and response platform for hybrid environments
Identity threat detection and response platform for hybrid environments
AI-powered deception platform using honeypots to detect & disrupt attacks
AI-powered deception platform using honeypots to detect & disrupt attacks
Cloud-native deception platform deploying dynamic security canaries
Cloud-native deception platform deploying dynamic security canaries
HoneyFS is an LLM-powered honeypot tool that generates realistic fake file systems using GPT-3.5 to deceive attackers and enhance security analysis.
HoneyFS is an LLM-powered honeypot tool that generates realistic fake file systems using GPT-3.5 to deceive attackers and enhance security analysis.
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
TANNER is a remote data analysis service that evaluates HTTP requests and generates responses for SNARE honeypots while emulating application vulnerabilities.
TANNER is a remote data analysis service that evaluates HTTP requests and generates responses for SNARE honeypots while emulating application vulnerabilities.
Fake protocol server simulator supporting 50+ network protocols for deception
Fake protocol server simulator supporting 50+ network protocols for deception
Cross-platform HTTP honeypot that traps bots with infinite data streams
Cross-platform HTTP honeypot that traps bots with infinite data streams
A nodejs web application honeypot designed for small environments like Raspberry Pi to capture and analyze malicious web-based attacks.
A nodejs web application honeypot designed for small environments like Raspberry Pi to capture and analyze malicious web-based attacks.
A honeypot that simulates an exposed networked printer using PJL protocol to capture and log attacker interactions through a virtual filesystem.
A honeypot that simulates an exposed networked printer using PJL protocol to capture and log attacker interactions through a virtual filesystem.
A Python script that detects and removes Thinkst Canary Tokens from files using signature-based detection methods.
A Python script that detects and removes Thinkst Canary Tokens from files using signature-based detection methods.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance