tolgadevsec / Awesome-DeceptionLinks
An awesome list of resources on deception-based security with honeypots and honeytokens
☆175Updated 7 months ago
Alternatives and similar repositories for Awesome-Deception
Users that are interested in Awesome-Deception are comparing it to the libraries listed below
Sorting:
- an awesome list of active defense resources☆124Updated 5 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆220Updated last year
- A semi-curated list of Security Feeds☆135Updated 2 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆173Updated last month
- Resources To Learn And Understand SIGMA Rules☆180Updated 2 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 4 months ago
- A curated list of awesome things related to TheHive & Cortex☆183Updated 3 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆370Updated this week
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆186Updated 3 years ago
- Zeek-Formatted Threat Intelligence Feeds☆374Updated this week
- A curated repository of incident response playbooks☆93Updated 2 years ago
- Threat Intel Platform for T-POTs☆159Updated 3 weeks ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆175Updated 2 years ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆84Updated last week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆96Updated last year
- A collection of intelligence about Log4Shell and its exploitation activity.☆183Updated 3 years ago
- MITRE Caldera™ for OT Plugins & Capabilities☆217Updated this week
- Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.☆545Updated 2 weeks ago
- Threat Hunting tool about Sysmon and graphs☆334Updated 2 years ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆143Updated 3 weeks ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆239Updated last year
- Sublime rules for email attack detection, prevention, and threat hunting.☆315Updated this week
- Open Threat Hunting Framework☆118Updated 2 years ago
- Creating a resource to help build and manage an Insider Threat program.☆71Updated 6 months ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆136Updated last year
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- A modular OSINT honeypot for blue teamers☆337Updated 2 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆119Updated 2 months ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆118Updated 2 years ago
- Repository resource for threat hunter☆158Updated 6 years ago