Tomcat Manager Honeypot View Tomcat Manager Honeypot
Bluetooth Honeypot with monitoring capabilities
Discover honeypots for advanced threat defense and early detection of malicious activity.
Bluetooth Honeypot with monitoring capabilities
A honeypot system that detects and identifies attack commands, recon attempts, and download commands, mimicking a vulnerable Elasticsearch instance.
A medium interaction printer honeypot that simulates a standard networked printer
GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.
A powerful tool for finding and exploiting subdomain takeover vulnerabilities
A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server
Blacknet is a low interaction SSH multi-head honeypot system with logging capabilities.
A correlated injection proxy tool for XSS Hunter
Honey-Pod for SSH that logs username and password tries during brute-force attacks.
Helix is a versatile honeypot designed to mimic the behavior of various protocols including Kubernetes API server, HTTP, TCP, and UDP.
An easy to set up SSH honeypot for logging SSH connections and activity.
A simple honeypot that collects credentials across various protocols
KFSensor is an intelligent honeypot system engineered for robust intrusion and insider threat detection within Windows environments. It proactively lures and identifies malicious actors by emulating vulnerable system services and trojans, effectively acting as a decoy. Pre-configured to monitor all TCP, UDP, and ICMP traffic, KFSensor provides immediate post-installation network visibility and offers easy customization for simulating additional bespoke services.
Snare is a robust suite of event monitoring and analysis tools engineered to satisfy stringent auditing and security mandates. It excels at collecting, filtering, and analyzing IT event data, providing essential capabilities for real-time security monitoring, deep-dive analysis, comprehensive auditing, and secure archiving. By delivering actionable insights from your IT infrastructure's events, Snare empowers organizations to proactively identify and mitigate threats, ensure compliance, and maintain a secure operational posture.
Tracebit redefines cloud intrusion detection by transforming security challenges into opportunities. Instead of complex rule sets that adversaries can evade, Tracebit deploys unique, anomaly-based decoys designed to be inherently difficult to bypass. This innovative approach generates highly actionable alerts, empowering security teams to detect and respond to threats more effectively while actively hindering adversary progress.