Deploy honeytokens across your network to detect unauthorized access and data exfiltration attempts.
Canarytokens is a free, open-source honeytoken platform that helps organizations detect unauthorized access and data exfiltration attempts. It creates digital tripwires—such as fake AWS keys, URLs, or documents—that trigger alerts when interacted with, providing early warning of security breaches.
Security teams, system administrators, and DevOps engineers responsible for monitoring network security and detecting intrusions in their infrastructure.
It offers a simple, lightweight alternative to complex intrusion detection systems, with easy deployment via Docker, flexible alerting options, and a wide variety of token types to match different attack vectors.
Canarytokens helps track activity and actions on your network.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Supports a wide range including AWS keys, DNS, SQL, and web image uploads, enabling coverage of multiple attack vectors as highlighted in the features.
Integrates with email, webhooks, and providers like Mailgun and SendGrid, allowing seamless workflow integration as detailed in the switchboard.env configuration.
Can be deployed via Docker on your own infrastructure, ensuring data privacy and full control, which is emphasized in the installation recommendations.
Includes configurable throttling to prevent alert fatigue and webhook failure handling for reliability, as described in the alert throttling and webhook sections.
Setup involves managing multiple environment files with strict rules, such as only one email provider at a time, which can be error-prone and time-consuming.
Lacks built-in response mechanisms; alerts must be manually acted upon, requiring additional tools for full incident response beyond the README's scope.
Features like IP geolocation depend on third-party services like ipinfo.io, adding potential points of failure and additional costs not covered in the base setup.