Home / Threat Defense / Honeypots

Honeypots

Discover honeypots for advanced threat defense and early detection of malicious activity.

Try these 162 AI Honeypots Tools

HonTel
Free

HonTel View HonTel

A low Interaction Client honeypot designed to detect malicious websites through signature, anomaly and pattern matching techniques.

Hornet
Free

Hornet View Hornet

High interaction honeypot solution for Linux systems with data control and integrity features.

HostileSubBruteforcer
Free

HostileSubBruteforcer View HostileSubBruteforcer

A DICOM server with a twist, blocking C-STORE attempts for protection but logging them.

Honeybrid
Free

Honeybrid View Honeybrid

Find domains and subdomains related to a given domain

Honeyd Tools
Free

Honeyd Tools View Honeyd Tools

Honeypot for Telnet service with configurable settings.

HoneyAlarmG2
Free

HoneyAlarmG2 View HoneyAlarmG2

A simple Postgres honey pot inspired by Elastichoney.

Honeycomb Plugins
Free

Honeycomb Plugins View Honeycomb Plugins

A Go-based honeypot server for detecting and logging attacker activity

honeydet
Free

honeydet View honeydet

A honeypot tool that simulates an open relay to capture and analyze spam

HoneyDrive
Free

HoneyDrive View HoneyDrive

GasPot is a honeypot simulation tool for Gas Station tanks in the oil and gas industry.

HoneyFS
Free

HoneyFS View HoneyFS

An Open-source intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue Teamers.

Hudinx
Free

Hudinx View Hudinx

A toolkit that transforms PHP applications into web-based high-interaction Honeypots for monitoring and analyzing attacks.

IMAP-Honey
Free

IMAP-Honey View IMAP-Honey

A tool for bruteforcing subdomains of a given domain

Intelligent HoneyNet Dashboard
Free

Intelligent HoneyNet Dashboard View Intelligent HoneyNet Dashboard

A honeypot agent for running honeypots with service and data at threatwar.com.

JSONBee
Free

JSONBee View JSONBee

A high-interaction honeypot solution for detecting and analyzing SMB-based attacks

Kako
Free

Kako View Kako

A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.

KFSensor
Free

KFSensor View KFSensor

An Open-source intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue Teamers.

Kippo
Free

Kippo View Kippo

A modified version of OpenSSH deamon forwarding commands to Cowrie for logging brute force attacks and shell interactions.

Kippo Stats
Free

Kippo Stats View Kippo Stats

A tool for embedding XXE/XML exploits into different filetypes

Kojoney
Free

Kojoney View Kojoney

A security platform that automates the deployment and management of security canaries across cloud infrastructure to detect potential intrusions and unauthorized access.

LaBrea
Free

LaBrea View LaBrea

A simple Elasticsearch honeypot to catch attackers exploiting RCE vulnerabilities.

Liffy
Free

Liffy View Liffy

A signature-based, multi-step, high interaction honeypot detection tool with support for various detection methods and protocols.

Log4Pot
Free

Log4Pot View Log4Pot

Multi-honeypot platform with various honeypots and monitoring tools.

Mailoney
Free

Mailoney View Mailoney

A honeypot for malware that spreads via USB storage devices, detecting infections without further information.

Malbait
Free

Malbait View Malbait

A Python web application honeypot that provides simple statistics for the Glastopf.