Serverless Trap Honeyλ Logo

Serverless Trap Honeyλ

0
Free
Visit Website

Using Cymon API v2 Based on Serverless framework pay-what-you-use provider agnostic Description: honeyλ allows you to create and monitor fake HTTP endpoints automatically. You can then place these URL honeytokens in e.g. your inbox, documents, browser history, or embed them as {hidden} links in your web pages. (Note: honeybits can be used for spreading breadcrumbs across your systems to lure the attackers toward your traps). Depending on how and where you implement honeytokens, you may detect human attackers, malicious insiders, content scrapers, or bad bots. This application is based on Serverless framework and can be deployed in different cloud providers such as Amazon Web Services (AWS), Microsoft Azure, IBM OpenWhisk or Google Cloud (Only tested on AWS; the main function may need small changes to support other providers). If your cloud provider is AWS, it automatically

FEATURES

ALTERNATIVES

Facilitating exchange of information and knowledge to collectively protect against cyberattacks.

A database of Tor exit nodes with their corresponding IP addresses and timestamps.

A project sharing malicious URLs used for malware distribution to help protect networks.

A Linux distribution designed for threat emulation and threat hunting, integrating attacker and defender tools for identifying threats in your environment.

msticpy is a library for InfoSec investigation and hunting in Jupyter Notebooks with extensive functionality for log data analysis, threat intelligence enrichment, and visualization.

A threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel

Repository of Yara signatures for detecting targeted attacks on civil society organizations

Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved