Project Artillery by Binary Defense Systems is a combination of a honeypot, monitoring tool, and alerting system that aims to evolve into a hardening monitoring platform to detect insecure configurations on Linux and Windows systems. It sets up common attack ports, blacklists attackers, monitors specified folders for modifications, tracks SSH logs for brute force attempts, and sends email alerts on attacks.
Common questions about Project Artillery including features, pricing, alternatives, and user reviews.
Project Artillery is A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations. It is a Security Operations solution designed to help security teams with Security Hardening, Linux, Windows.
Project Artillery is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/BinaryDefense/artillery/ for download and installation instructions.
Popular alternatives to Project Artillery include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
Project Artillery is for security teams and organizations that need Security Hardening, Linux, Windows. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources.
PhoneyC is a client-side honeypot that emulates vulnerable web browsers to detect and analyze malicious web content and browser-based exploits.
A simpler version of a honeypot that looks for connections from external parties and performs a specific action, usually blacklisting.