Track Documents.
Trap Intruders.
Deploy invisible tracking in documents and executables. Monitor your infrastructure with honeypots and agents. Know when your files are accessed, from where, and by whom.
Security Blind Spots Are Everywhere
Without proper visibility, threats go unnoticed until it's too late.
TS/Entrap gives you
eyes everywhere.
A complete tracking and monitoring infrastructure that deploys in minutes and alerts you instantly when something happens.
Comprehensive Security Monitoring
Five powerful capabilities working together to give you complete visibility.
Trackable Documents
Generate PDFs with embedded tracking that silently reports back when opened. Know exactly who accessed your documents, when, and from where.
- Invisible tracking embedded in PDFs
- Captures IP address, geolocation, and user agent
- Works with most PDF readers including Adobe
- Multiple tracking methods for reliability
Filesystem Monitoring Agents
Deploy lightweight Go agents on any system to monitor file access, modification, and deletion events in real-time.
- Lightweight binary with minimal footprint
- Monitor specific files or entire directories
- Real-time event reporting to controller
- Works online and offline with event buffering
Honeypot Services
Run fake SSH, HTTP, and TCP services that look real to attackers. Every connection attempt is logged and triggers instant alerts.
- SSH honeypot captures credentials and commands
- HTTP honeypot logs all requests and payloads
- TCP honeypot monitors arbitrary port connections
- Configurable responses and banners
Port Scan Detection
Detect reconnaissance attempts before attackers find your real services. Configure trap ports and get alerted to scanning activity.
- Configure trap ports that should never receive traffic
- Threshold-based detection to reduce false positives
- Detailed logging of scan patterns and sources
- Instant alerts when scans are detected
Hardware Security Devices
Deploy physical devices in your office environment. Network scanners detect internal reconnaissance while USB and SD card traps catch unauthorized access attempts.
- Network scanners for internal honeypot deployment
- USB flash drives with autorun traps and decoy files
- SD cards with honeypot documents for physical access detection
- Centralized monitoring of all hardware sensors
From Setup to Detection in Minutes
A simple workflow that gets you monitoring quickly.
Deploy
Install the controller on your server and set up the dashboard.
Generate
Create trackable PDFs or generate enrollment tokens for agents.
Distribute
Share documents with targets or deploy agents to systems.
Detect
Receive instant notifications when files are accessed or intruders probe.
Respond
Review detailed logs with IP, location, and timing data.
Deploy
Install the controller on your server and set up the dashboard.
Generate
Create trackable PDFs or generate enrollment tokens for agents.
Distribute
Share documents with targets or deploy agents to systems.
Detect
Receive instant notifications when files are accessed or intruders probe.
Respond
Review detailed logs with IP, location, and timing data.
Built for Security Professionals
Whether you're defending your organization or testing its defenses, TomeSpell has you covered.
Security Teams
Detect data exfiltration and insider threats before they become breaches.
- Track sensitive documents across the organization
- Set up canary files to detect unauthorized access
- Monitor critical system files for tampering
Red Teams
Enhance your penetration testing and phishing assessments with tracking.
- Embed tracking in phishing assessment documents
- Monitor C2 decoy file access
- Track lateral movement with honeypots
Compliance Officers
Maintain audit trails and demonstrate due diligence for regulations.
- Log all access to sensitive documents
- Generate compliance reports automatically
- Prove chain of custody for legal holds
Incident Response
Deploy rapid detection during active investigations.
- Set up honeypots to track attacker movement
- Monitor compromised systems for further access
- Collect evidence of unauthorized activity
Frequently Asked Questions
Everything you need to know about TomeSpell.
Ready to track your infrastucture
and catch intruders early?
Deploy TomeSpell today and gain complete visibility into your documents and infrastructure.
Get Started Now