Skip to main contentSkip to site searchApps with 'Honeypot' feature
Secure email with absolutely no compromises, brought to you by MIT and CERN scientists. Order, configure and deploy your Canaries throughout your network. (These can be hardware, virtual or cloud-based birds!) Make one a Windows file server, another a router, throw in a few Linux webservers while you're at it.
Labyrinth Deception Platform is a deception-based threat detection technology that identifies and blocks cyber-attacks from within a corporate network. Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. Tina is a network security appliance that is developed for detection and prevention of contemporary cyber threats. Having aa hybrid design, Tina consists of various technologies; DPI, cyber intelligence, cloud technologies, honeypot and sandbox. Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker. Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. Cowrie also functions as an SSH and telnet proxy to observe attacker behavior to another system.