deception-honeypot
CommunityDetect threats with deception.
Software Engineering#detection#honeypot#threat intelligence#lateral movement#deception#canary tokens
Authorjaskaranhundal
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill helps you proactively detect malicious activity within your network by strategically deploying deceptive assets like honeypots and canary tokens, ensuring that any adversary movement is immediately flagged.
Core Features & Use Cases
- Honeypot Deployment: Design and place various types of honeypots (credential, service, database) to lure and detect attackers.
- Canary Token Strategy: Implement deceptive tokens (AWS keys, DNS, web bugs) to catch credential theft and data exfiltration attempts.
- Lateral Movement Traps: Set up fake credentials and shares to identify attackers moving within your network.
- Use Case: Protect your critical assets by deploying a credential honeypot near your domain controllers and seeding sensitive documents with DNS canary tokens to detect unauthorized access or exfiltration.
Quick Start
Use the deception-honeypot skill to plan the deployment of 3 credential honeypots and 47 AWS key canary tokens.
Dependency Matrix
Required Modules
None requiredComponents
scriptsreferencesassets
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: deception-honeypot Download link: https://github.com/jaskaranhundal/usap-skills/archive/main.zip#deception-honeypot Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.