AlternativeTo Logo

Apps with 'Honeypot' feature

  1. Secure email with absolutely no compromises, brought to you by MIT and CERN scientists.
    • Software as a Service (SaaS)
    More
    More
    Order, configure and deploy your Canaries throughout your network. (These can be hardware, virtual or cloud-based birds!) Make one a Windows file server, another a router, throw in a few Linux webservers while you're at it.


  2. Labyrinth Deception Platform is a deception-based threat detection technology that identifies and blocks cyber-attacks from within a corporate network.
  3. Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time.
    No screenshots yet
    • Software as a Service (SaaS)
    More
    Tina is a network security appliance that is developed for detection and prevention of contemporary cyber threats. Having aa hybrid design, Tina consists of various technologies; DPI, cyber intelligence, cloud technologies, honeypot and sandbox.
    No screenshots yet
    • FreeOpen Source
    • Linux
    More
    More
    Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.
    • FreeOpen Source
    • Linux
    More
    More
    Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. Cowrie also functions as an SSH and telnet proxy to observe attacker behavior to another system.