Signature based honeypot detector tool written in Golang
-
Updated
Mar 22, 2025 - Go
Signature based honeypot detector tool written in Golang
Automation tool for Windows Deception Host Burn-In
A simple SSH gateway for deception deployments
Deceptive Operations: Lure, Observe, and Secure Tool
Behavioral User-driven Deceptive Activities Framework
A deceptive web application designed to lure and monitor potential attackers by simulating a real, sensitive environment. It logs IPs, geolocation, user-agents, and suspicious interactions, and runs on a Dockerized Flask app deployed via AWS EC2 for scalable cybersecurity analysis.
A fork of the original mailhoney SMTP honeypot rewritten due to library deprecation
A portable active cyber defense tool that uses decoy-based delaying tactics to mislead and restrain attackers in untrusted networks.
A fork of Spamhole by Dustin Trammell with added safety
Advanced deception framework for security testing, digital forensics, and red teaming. Generates realistic fake data including SSH keys, web history, documents, API keys, source code, and system logs.
Multi-protocol authentication honeypot framework with advanced evasion, fake success responses, and Docker deployment. Captures SSH, FTP, Telnet, HTTP/HTTPS, MySQL, RDP, and SMB attacks.
A specialized deception engineering tool mimicking SAP NetWeaver login interfaces to capture threat intelligence and detect credential harvesting attacks.
Spam Honeypot Tool (With Docker)
A real-world, open-source Defense-in-Depth security framework built through CI/CD in production by security professionals.
🛡️ Detect and analyze authentication attacks with a robust honeypot framework that simulates real services across multiple protocols.
Add a description, image, and links to the deception-technology topic page so that developers can more easily learn about it.
To associate your repository with the deception-technology topic, visit your repo's landing page and select "manage topics."