Toms Honey Pot Logo

Toms Honey Pot

0
Free
Visit Website

Toms Honey Pot is a honeypot system designed to detect and analyze potential security threats. It is based on the concept of honeypot systems, which are designed to mimic the appearance of a legitimate system or service, but are actually decoys. Toms Honey Pot is designed to detect and analyze potential security threats by monitoring and analyzing the behavior of potential attackers. It is a powerful tool for detecting and analyzing potential security threats, and can be used to improve the security of a network or system. Toms Honey Pot is a valuable tool for anyone who wants to improve the security of their network or system, and is a valuable addition to any security toolkit.

FEATURES

ALTERNATIVES

Passive SSL client fingerprinting tool using handshake analysis.

Passive Network Audit Framework (PNAF) v0.1.2 provides passive network auditing capabilities and is now a project of COSMIC-Chapter of The Honeynet Project.

FingerprintX is a standalone utility for service discovery on open ports.

A simple honeypot that opens a listening socket and waits for connection attempts, with configurable reply and event handling

Repository of pcap traces for evaluating Network Intrusion Detection Systems in HVAC systems.

A Bluetooth 5 and 4.x sniffer using TI CC1352/CC26x2 hardware with advanced features and Python-based host-side software.

A website scanner that provides a sandbox for the web, allowing users to scan URLs and websites for potential threats and vulnerabilities.

Django based web application for network traffic analysis with protocol handling capabilities.

PINNED

InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Commercial
Resources
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Free
Resources
Kriptos Logo

Kriptos

An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

Commercial
Data Protection
System Two Security Logo

System Two Security

An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Commercial
Security Operations
Aikido Security Logo

Aikido Security

Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Commercial
Application Security
Permiso Logo

Permiso

Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Commercial
IAM
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Commercial
Cloud Security
Adversa AI Logo

Adversa AI

Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.

Commercial
AI Security