HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior, allowing users to monitor and analyze malicious activity on their networks. The platform offers a range of features, including threat API access, network monitoring, and agent deployment, to help organizations improve their threat detection and response capabilities. With HoneyDB, users can gain visibility into attacker tactics, techniques, and procedures (TTPs), and leverage this information to enhance their security posture. The platform's threat intelligence feeds can be integrated with existing security tools, enabling more effective incident response and threat hunting. HoneyDB's user-friendly interface provides easy access to threat data, including IP addresses, protocols, and service information, making it easier for security teams to identify and respond to threats in real-time.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
VirusTotal API v3 is a threat intelligence platform for scanning files, URLs, and IP addresses, and retrieving reports on threat reputation and context.
In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.
ZoomEye is an advanced cyberspace search engine that provides detailed information on cyberspace assets, including server software and version information, for cybersecurity experts, researchers, and enterprises.
A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.
A platform providing real-time threat intelligence streams and reports on internet-exposed assets to help organizations monitor and secure their attack surface.
A project sharing malicious URLs used for malware distribution to help protect networks.
A community-driven public malware repository providing access to malware samples, tools, and resources for the cybersecurity community.
The Trystero Project is a threat intelligence platform that measures email security efficacy and provides various tools and resources, while VMware Carbon Black offers endpoint protection and workload security solutions.
A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.