Skip to content
#

deception-technology

Here are 11 public repositories matching this topic...

A deceptive web application designed to lure and monitor potential attackers by simulating a real, sensitive environment. It logs IPs, geolocation, user-agents, and suspicious interactions, and runs on a Dockerized Flask app deployed via AWS EC2 for scalable cybersecurity analysis.

  • Updated May 10, 2025
  • HTML

Improve this page

Add a description, image, and links to the deception-technology topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the deception-technology topic, visit your repo's landing page and select "manage topics."

Learn more