Add a layer of active defense to your cloud applications.
-
Updated
Nov 21, 2024 - Go
Add a layer of active defense to your cloud applications.
Deceptive Operations: Lure, Observe, and Secure Tool
SneakPeeker is a tool for finding and removing Canary tokens.
Honeytoken Infrastructure as Code Framework?? That seems too ambitious...
Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).
安全、快捷、高交互、企业级的蜜罐管理系统,护网;支持多种协议蜜罐、蜜签、诱饵等功能。A safe, fast, highly interactive and enterprise level honeypot management system, supports multiple protocol honeypots, honeytokens, baits and other functions.
An awesome list of resources on deception-based security with honeypots and honeytokens
Acra poison records example project: see how to prevent malicious SELECT * queries to your SQL database
A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the attacker toward your honeypots
honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top of AWS Lambda and Amazon API Gateway
Deception based detection techniques mapped to the MITRE’s ATT&CK framework
Add a description, image, and links to the honeytoken topic page so that developers can more easily learn about it.
To associate your repository with the honeytoken topic, visit your repo's landing page and select "manage topics."