Serverless Trap Honeyλ Logo

Serverless Trap Honeyλ

0
Free
Visit Website

Using Cymon API v2 Based on Serverless framework pay-what-you-use provider agnostic Description: honeyλ allows you to create and monitor fake HTTP endpoints automatically. You can then place these URL honeytokens in e.g. your inbox, documents, browser history, or embed them as {hidden} links in your web pages. (Note: honeybits can be used for spreading breadcrumbs across your systems to lure the attackers toward your traps). Depending on how and where you implement honeytokens, you may detect human attackers, malicious insiders, content scrapers, or bad bots. This application is based on Serverless framework and can be deployed in different cloud providers such as Amazon Web Services (AWS), Microsoft Azure, IBM OpenWhisk or Google Cloud (Only tested on AWS; the main function may need small changes to support other providers). If your cloud provider is AWS, it automatically

FEATURES

ALTERNATIVES

A collection of Yara rules for the Burp Yara-Scanner extension to identify malicious software on websites.

Real-time monitoring tool for newly issued SSL certificates.

Advanced threat prevention and detection platform leveraging Deep CDR, Multiscanning, and Sandbox technologies to protect against data breaches and ransom attacks.

A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.

A library of event-based analytics written in EQL to detect adversary behaviors, now integrated into the Detection Engine of Kibana.

A tool for quick and effective Yara rule creation to isolate malware families and malicious objects.

Intelligence feeds for cybersecurity professionals to stay informed about emerging threats and trends.

Open Source Threat Intelligence Collector with plugin-oriented framework.

PINNED