Using Cymon API v2 Based on Serverless framework pay-what-you-use provider agnostic Description: honeyλ allows you to create and monitor fake HTTP endpoints automatically. You can then place these URL honeytokens in e.g. your inbox, documents, browser history, or embed them as {hidden} links in your web pages. (Note: honeybits can be used for spreading breadcrumbs across your systems to lure the attackers toward your traps). Depending on how and where you implement honeytokens, you may detect human attackers, malicious insiders, content scrapers, or bad bots. This application is based on Serverless framework and can be deployed in different cloud providers such as Amazon Web Services (AWS), Microsoft Azure, IBM OpenWhisk or Google Cloud (Only tested on AWS; the main function may need small changes to support other providers). If your cloud provider is AWS, it automatically
FEATURES
SIMILAR TOOLS
A digital risk protection platform that combines threat intelligence, dark web monitoring, attack surface management, brand protection, and supply chain intelligence to detect and respond to external cyber threats.
Tools to export data from MISP MySQL database for post-incident analysis and correlation.
CyBot is a free and open source threat intelligence chat bot with a community-driven plugin framework.
Maltrail is a malicious traffic detection system utilizing blacklists and heuristic mechanisms.
A simple, self-contained modular host-based IOC scanner for incident responders.
Stay informed with Rapid7's cybersecurity blog and vulnerability news updates.
Amazon GuardDuty is a threat detection service for AWS accounts.
A tool for extracting IOCs from various input sources and converting them into JSON format.
A threat intelligence service providing actionable IoCs and security data feeds to help organizations detect, block, and respond to cyber threats.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.