DejaVU - Open Source Deception Framework
☆426Aug 2, 2025Updated 7 months ago
Alternatives and similar repositories for Dejavu
Users that are interested in Dejavu are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ANWI - All New Wireless IDS☆29Aug 3, 2018Updated 7 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Jan 6, 2023Updated 3 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆292Oct 28, 2017Updated 8 years ago
- ☆137Mar 20, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Mallet is an intercepting proxy for arbitrary protocols☆289Apr 14, 2025Updated 11 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,314Jan 22, 2025Updated last year
- snake - a malware storage zoo☆217Jul 11, 2023Updated 2 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 6 years ago
- Burp extension to help developers replicate findings from pen tests☆70Jul 22, 2024Updated last year
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆425Mar 13, 2026Updated last week
- Collecting & Hunting for IOCs with gusto and style☆241Aug 1, 2021Updated 4 years ago
- Platform Firmware Auditing Tool☆131Sep 7, 2018Updated 7 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,723Sep 23, 2025Updated 6 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Mar 15, 2018Updated 8 years ago
- ☆79Aug 4, 2022Updated 3 years ago
- Pre-OS microcode updater☆43Aug 25, 2018Updated 7 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- Android Automation Tool☆21May 9, 2018Updated 7 years ago
- Open Source Threat Intelligence Chat Bot☆323Mar 30, 2020Updated 5 years ago
- An information security preparedness tool to do adversarial simulation.☆1,138Apr 1, 2019Updated 6 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆211Nov 16, 2018Updated 7 years ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Java API for SSL\TLS scanning and reporting☆148Mar 18, 2026Updated last week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,141Oct 19, 2025Updated 5 months ago
- First IDE for Nmap Script (NSE) Development.☆359Aug 8, 2020Updated 5 years ago
- Open source Active Directory security audit framework.☆137Jan 15, 2018Updated 8 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆401Feb 27, 2024Updated 2 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆141Mar 7, 2018Updated 8 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆418Aug 10, 2023Updated 2 years ago
- VirusTotal Wanna Be - Now with 100% more Hipster☆1,850Apr 3, 2023Updated 2 years ago
- ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.☆2,445Jun 11, 2025Updated 9 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆25Jun 19, 2017Updated 8 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆214Jun 23, 2020Updated 5 years ago
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,167Dec 8, 2022Updated 3 years ago
- ☆349Mar 19, 2021Updated 5 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆370Feb 7, 2019Updated 7 years ago