安全、快捷、高交互、企业级的蜜罐管理系统,护网;支持多种协议蜜罐、蜜签、诱饵等功能。A safe, fast, highly interactive and enterprise level honeypot management system, supports multiple protocol honeypots, honeytokens, baits and other functions.
-
Updated
Oct 17, 2023 - Go
安全、快捷、高交互、企业级的蜜罐管理系统,护网;支持多种协议蜜罐、蜜签、诱饵等功能。A safe, fast, highly interactive and enterprise level honeypot management system, supports multiple protocol honeypots, honeytokens, baits and other functions.
honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top of AWS Lambda and Amazon API Gateway
Deception based detection techniques mapped to the MITRE’s ATT&CK framework
A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the attacker toward your honeypots
An awesome list of resources on deception-based security with honeypots and honeytokens
Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).
Add a layer of active defense to your cloud applications.
SneakPeeker is a tool for finding and removing Canary tokens.
Deceptive Operations: Lure, Observe, and Secure Tool
Acra poison records example project: see how to prevent malicious SELECT * queries to your SQL database
Honeytoken Infrastructure as Code Framework?? That seems too ambitious...
Add a description, image, and links to the honeytoken topic page so that developers can more easily learn about it.
To associate your repository with the honeytoken topic, visit your repo's landing page and select "manage topics."