Skip to content
#

deception-technology

Here are 20 public repositories matching this topic...

A distributed, AI-powered honeypot system for Kubernetes. Uses OpenRouter to access 100+ LLMs (GPT-4o, Claude, Gemini) for generating realistic, context-aware vulnerable server responses. Features advanced scanner detection, session memory, and detailed artifact logging to trick attackers and capture threat intelligence.

  • Updated Dec 7, 2025
  • Python

A deceptive web application designed to lure and monitor potential attackers by simulating a real, sensitive environment. It logs IPs, geolocation, user-agents, and suspicious interactions, and runs on a Dockerized Flask app deployed via AWS EC2 for scalable cybersecurity analysis.

  • Updated May 10, 2025
  • HTML

A novel adaptive security and deception platform using biological metaphors (protein folding, enzyme kinetics, immune response) with real cryptography, high-interaction honeypots, and Prometheus monitoring. Designed for biotech, pharma, and clinical research defense.

  • Updated Dec 11, 2025
  • Python

> Intelligent ML-powered honeypot infrastructure that captures, classifies, visualizes cyber attacks in real-time using Python, FastAPI, and scikit-learn.

  • Updated Dec 8, 2025
  • Python

Improve this page

Add a description, image, and links to the deception-technology topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the deception-technology topic, visit your repo's landing page and select "manage topics."

Learn more