tolgadevsec / Awesome-DeceptionView external linksLinks
An awesome list of resources on deception-based security with honeypots and honeytokens
☆180Dec 23, 2024Updated last year
Alternatives and similar repositories for Awesome-Deception
Users that are interested in Awesome-Deception are comparing it to the libraries listed below
Sorting:
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆291Oct 28, 2017Updated 8 years ago
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated last month
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆25Jun 19, 2017Updated 8 years ago
- A PowerShell module to deploy active directory decoy objects.☆240Nov 17, 2019Updated 6 years ago
- an awesome list of honeypot resources☆10,146Apr 1, 2025Updated 10 months ago
- Collection of useful Canary tools☆93Jan 29, 2026Updated 2 weeks ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆18Mar 3, 2022Updated 3 years ago
- Resources To Learn And Understand SIGMA Rules☆182Feb 14, 2023Updated 3 years ago
- DejaVU - Open Source Deception Framework☆424Aug 2, 2025Updated 6 months ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆23Jan 21, 2024Updated 2 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Jul 11, 2023Updated 2 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆19Mar 17, 2021Updated 4 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated last month
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Aug 13, 2024Updated last year
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆20Mar 24, 2022Updated 3 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63May 30, 2025Updated 8 months ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.☆11Apr 27, 2023Updated 2 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆780Updated this week
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆207Feb 7, 2026Updated last week
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆155Mar 27, 2023Updated 2 years ago
- A Nginx reverse proxy that authenticates users using their personal certificates. Includes everything to create and revoke those certific…☆29Mar 8, 2021Updated 4 years ago
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆662Updated this week
- an awesome list of active defense resources☆129Jul 11, 2020Updated 5 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Aug 3, 2018Updated 7 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆15Jan 2, 2024Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- A powershell script for creating a Windows honeyport.☆12Jun 24, 2015Updated 10 years ago
- [NAACL 2025] LLM-Supported Natural Language to Bash Translation☆16Jul 17, 2025Updated 6 months ago