Signature based honeypot detector tool written in Golang
-
Updated
Mar 22, 2025 - Go
Signature based honeypot detector tool written in Golang
Automation tool for Windows Deception Host Burn-In
A simple SSH gateway for deception deployments
Deceptive Operations: Lure, Observe, and Secure Tool
Behavioral User-driven Deceptive Activities Framework
A distributed, AI-powered honeypot system for Kubernetes. Uses OpenRouter to access 100+ LLMs (GPT-4o, Claude, Gemini) for generating realistic, context-aware vulnerable server responses. Features advanced scanner detection, session memory, and detailed artifact logging to trick attackers and capture threat intelligence.
A deceptive web application designed to lure and monitor potential attackers by simulating a real, sensitive environment. It logs IPs, geolocation, user-agents, and suspicious interactions, and runs on a Dockerized Flask app deployed via AWS EC2 for scalable cybersecurity analysis.
A fork of the original mailhoney SMTP honeypot rewritten due to library deprecation
A portable active cyber defense tool that uses decoy-based delaying tactics to mislead and restrain attackers in untrusted networks.
Multi-protocol authentication honeypot framework with advanced evasion, fake success responses, and Docker deployment. Captures SSH, FTP, Telnet, HTTP/HTTPS, MySQL, RDP, and SMB attacks.
Advanced deception framework for security testing, digital forensics, and red teaming. Generates realistic fake data including SSH keys, web history, documents, API keys, source code, and system logs.
A fork of Spamhole by Dustin Trammell with added safety
AI-powered SSH Honeypot using Go and Gemini 2.5
A specialized deception engineering tool mimicking SAP NetWeaver login interfaces to capture threat intelligence and detect credential harvesting attacks.
A novel adaptive security and deception platform using biological metaphors (protein folding, enzyme kinetics, immune response) with real cryptography, high-interaction honeypots, and Prometheus monitoring. Designed for biotech, pharma, and clinical research defense.
Spam Honeypot Tool (With Docker)
> Intelligent ML-powered honeypot infrastructure that captures, classifies, visualizes cyber attacks in real-time using Python, FastAPI, and scikit-learn.
A real-world, open-source Defense-in-Depth security framework built through CI/CD in production by security professionals.
🛡️ Detect and analyze authentication attacks with a robust honeypot framework that simulates real services across multiple protocols.
Add a description, image, and links to the deception-technology topic page so that developers can more easily learn about it.
To associate your repository with the deception-technology topic, visit your repo's landing page and select "manage topics."