Skip to content
#

ec2

Here are 98 public repositories matching this topic...

A deceptive web application designed to lure and monitor potential attackers by simulating a real, sensitive environment. It logs IPs, geolocation, user-agents, and suspicious interactions, and runs on a Dockerized Flask app deployed via AWS EC2 for scalable cybersecurity analysis.

  • Updated May 10, 2025
  • HTML

Improve this page

Add a description, image, and links to the ec2 topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the ec2 topic, visit your repo's landing page and select "manage topics."

Learn more