Penetration testing commands for Honeypot and Decoy

Honeypots and decoy systems are deployed to attract and monitor malicious activity, helping defenders understand attack methodologies and strengthen overall security postures.

NameDescriptionPrice
broneypoteHoneypotFree
CanarytokensQuickly deployable honeypot with docker image, the online service allows to get alerted by email for URL token, DNS token, unique email address, custom image, MS word doc., Acrobat Reader PDF doc., and moreFree
DejaVUDeception framework which can be used to deploy decoys across the infrastructureFree
GalahLLM-powered web honeypot using the OpenAI APIFree
pypotomuxProtocol demuxed honeypot and wordlists collected from itFree