There are 2 repositories under honeytoken topic.
honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top of AWS Lambda and Amazon API Gateway
Deception based detection techniques mapped to the MITRE’s ATT&CK framework
An awesome list of resources on deception-based security with honeypots and honeytokens
Script designed to identify Canary Tokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).
Add a layer of active defense to your cloud applications.
Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!
Acra poison records example project: see how to prevent malicious SELECT * queries to your SQL database
Deceptive Operations: Lure, Observe, and Secure Tool
Honeytoken Infrastructure as Code Framework?? That seems too ambitious...