Honeypots
Discover honeypots for advanced threat defense and early detection of malicious activity.
Try these 162 AI Honeypots Tools
Tracebit
A honeypot system that detects and identifies attack commands, recon attempts, and download commands, mimicking a vulnerable Elasticsearch instance.
Trapster Community
A medium interaction printer honeypot that simulates a standard networked printer
Twisted Honeypots
GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.
VerySimpleHoneypot
A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server
WebLogic Honeypot
Blacknet is a low interaction SSH multi-head honeypot system with logging capabilities.
Whonow
Honey-Pod for SSH that logs username and password tries during brute-force attacks.
xss2png
Helix is a versatile honeypot designed to mimic the behavior of various protocols including Kubernetes API server, HTTP, TCP, and UDP.
KFSensor View KFSensor
KFSensor is an intelligent honeypot system engineered for robust intrusion and insider threat detection within Windows environments. It proactively lures and identifies malicious actors by emulating vulnerable system services and trojans, effectively acting as a decoy. Pre-configured to monitor all TCP, UDP, and ICMP traffic, KFSensor provides immediate post-installation network visibility and offers easy customization for simulating additional bespoke services.
Snare View Snare
Snare is a robust suite of event monitoring and analysis tools engineered to satisfy stringent auditing and security mandates. It excels at collecting, filtering, and analyzing IT event data, providing essential capabilities for real-time security monitoring, deep-dive analysis, comprehensive auditing, and secure archiving. By delivering actionable insights from your IT infrastructure's events, Snare empowers organizations to proactively identify and mitigate threats, ensure compliance, and maintain a secure operational posture.
Tracebit View Tracebit
Tracebit redefines cloud intrusion detection by transforming security challenges into opportunities. Instead of complex rule sets that adversaries can evade, Tracebit deploys unique, anomaly-based decoys designed to be inherently difficult to bypass. This innovative approach generates highly actionable alerts, empowering security teams to detect and respond to threats more effectively while actively hindering adversary progress.