implementing-network-deception-with-honeypots
mukul975/Anthropic-Cybersecurity-Skills
Guides deploying and managing OpenCanary, Cowrie, and T-Pot honeypots to detect lateral movement, alert on unauthorized scanning, capture attacker commands, and feed SIEMs, with planning, configuration, monitoring, and maintenance steps.