An awesome list of resources on deception-based security with honeypots and honeytokens
☆181Dec 23, 2024Updated last year
Alternatives and similar repositories for Awesome-Deception
Users that are interested in Awesome-Deception are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆291Oct 28, 2017Updated 8 years ago
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated 3 months ago
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆24Jun 19, 2017Updated 8 years ago
- A PowerShell module to deploy active directory decoy objects.☆239Nov 17, 2019Updated 6 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DejaVU - Open Source Deception Framework☆425Aug 2, 2025Updated 8 months ago
- an awesome list of honeypot resources☆10,231Apr 1, 2025Updated last year
- A Red Team Script to Detect Canary Tokens and Seed Files☆15Jan 2, 2024Updated 2 years ago
- Collection of useful Canary tools☆94Apr 8, 2026Updated last week
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Oct 21, 2024Updated last year
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- Static file analysis for PE files☆13Dec 4, 2020Updated 5 years ago
- A powershell script for creating a Windows honeyport.☆12Jun 24, 2015Updated 10 years ago
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Jan 9, 2017Updated 9 years ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated 2 months ago
- Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.☆11Apr 27, 2023Updated 2 years ago
- ☆16Feb 12, 2019Updated 7 years ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆277Mar 20, 2019Updated 7 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆20Mar 17, 2021Updated 5 years ago
- Forensic tool for acquisition, triage and analysis of remote block devices via iSCSI protocol.☆44Oct 25, 2024Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆24Jan 21, 2024Updated 2 years ago
- A DICOM honeypot for detecting and logging unauthorized access attempts☆58Mar 18, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The three algorithms used to solve Bayesian Stackelberg Games have been implemented here.☆29Aug 9, 2018Updated 7 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆508Jul 13, 2022Updated 3 years ago
- Resources To Learn And Understand SIGMA Rules☆184Feb 14, 2023Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Jan 29, 2019Updated 7 years ago
- ☆10Jun 16, 2021Updated 4 years ago
- Automatic Prompt Injection testing tool☆25Mar 8, 2025Updated last year
- an awesome list of active defense resources☆129Jul 11, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆802Apr 6, 2026Updated last week
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆679Apr 8, 2026Updated last week
- ☆16Mar 4, 2019Updated 7 years ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, fo…☆13Aug 19, 2022Updated 3 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,564Apr 3, 2026Updated 2 weeks ago
- Some of the lab files for the SANS Institute course SEC505: Securing Windows and PowerShell Automation: https://sans.org/sec505☆18Jun 8, 2017Updated 8 years ago