Serverless Trap Honeyλ Logo

Serverless Trap Honeyλ

0
Free
Visit Website

Using Cymon API v2 Based on Serverless framework pay-what-you-use provider agnostic Description: honeyλ allows you to create and monitor fake HTTP endpoints automatically. You can then place these URL honeytokens in e.g. your inbox, documents, browser history, or embed them as {hidden} links in your web pages. (Note: honeybits can be used for spreading breadcrumbs across your systems to lure the attackers toward your traps). Depending on how and where you implement honeytokens, you may detect human attackers, malicious insiders, content scrapers, or bad bots. This application is based on Serverless framework and can be deployed in different cloud providers such as Amazon Web Services (AWS), Microsoft Azure, IBM OpenWhisk or Google Cloud (Only tested on AWS; the main function may need small changes to support other providers). If your cloud provider is AWS, it automatically

FEATURES

ALTERNATIVES

QRadio is a tool/framework designed to consolidate cyber threats intelligence sources.

DNSDumpster is a domain research tool for discovering and analyzing DNS records to map an organization's attack surface.

Tools to export data from MISP MySQL database for post-incident analysis and correlation.

Home for rules used by Elastic Security with code for unit testing, Kibana integration, and Red Team Automation.

VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.

RogueApps is a collaborative repository documenting TTPs of malicious OIDC/OAuth 2.0 applications for cybersecurity research and awareness.

Cortex is a tool for analyzing observables at scale and automating threat intelligence, digital forensics, and incident response.

Cisco Umbrella is a cloud security platform that offers protection against threats on the internet by blocking malicious activity.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved