Signature based honeypot detector tool written in Golang
-
Updated
Mar 22, 2025 - Go
Signature based honeypot detector tool written in Golang
Automation tool for Windows Deception Host Burn-In
A lightweight distributed deception hub. Catch lateral movement and threats using zero-noise tripwires.
A simple SSH gateway for deception deployments
Deceptive Operations: Lure, Observe, and Secure Tool
Behavioral User-driven Deceptive Activities Framework
A distributed, AI-powered honeypot system for Kubernetes. Uses OpenRouter to access 100+ LLMs (GPT-4o, Claude, Gemini) for generating realistic, context-aware vulnerable server responses. Features advanced scanner detection, session memory, and detailed artifact logging to trick attackers and capture threat intelligence.
Deploys 14 Honeypot services (SSH, Telnet, ADB, MongoDB, VNC, MySQL, etc). Real-time dashboard with live WebSocket updates, attack geolocation, automated alerts + IP blocking, and payload/IOC analysis.
A portable active cyber defense tool that uses decoy-based delaying tactics to mislead and restrain attackers in untrusted networks.
A deceptive web application designed to lure and monitor potential attackers by simulating a real, sensitive environment. It logs IPs, geolocation, user-agents, and suspicious interactions, and runs on a Dockerized Flask app deployed via AWS EC2 for scalable cybersecurity analysis.
A fork of the original mailhoney SMTP honeypot rewritten due to library deprecation
Adversarial Cognitive Portal Trap Architecture — A multi-layered defensive system that contains, degrades, disrupts, and commandeers autonomous offensive AI agents via a reverse kill chain (L0-L4).
New and improved ESP32-P4 based PoE honeypot
Multi-protocol authentication honeypot framework with advanced evasion, fake success responses, and Docker deployment. Captures SSH, FTP, Telnet, HTTP/HTTPS, MySQL, RDP, and SMB attacks.
A fork of Spamhole by Dustin Trammell with added safety
Advanced deception framework for security testing, digital forensics, and red teaming. Generates realistic fake data including SSH keys, web history, documents, API keys, source code, and system logs.
AI-powered SSH Honeypot using Go and Gemini 2.5
RCDIDN V1.0 — Hacker Killer | Active Cyber Deception System
Collection of honeypot implementations -- each honeypot lives on its own branch (hp-{protocol}-{variant})
Add a description, image, and links to the deception-technology topic page so that developers can more easily learn about it.
To associate your repository with the deception-technology topic, visit your repo's landing page and select "manage topics."