tolgadevsec / Awesome-Deception
An awesome list of resources on deception-based security with honeypots and honeytokens
☆162Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Awesome-Deception
- Threat-Intelligence Feeds & Tools & Frameworks☆211Updated 5 months ago
- A curated list of awesome things related to TheHive & Cortex☆173Updated 3 years ago
- CASCADE Server☆264Updated last year
- A set of Zeek scripts to detect ATT&CK techniques.☆565Updated 4 months ago
- Data from a BRAWL Automated Adversary Emulation Exercise☆202Updated 4 years ago
- an awesome list of active defense resources☆113Updated 4 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆60Updated 7 months ago
- A Python package to interact with the Mitre ATT&CK Framework☆468Updated last year
- A semi-curated list of Security Feeds☆116Updated 2 years ago
- Collection of created MindMaps☆151Updated last year
- Zeek Log Cheatsheets☆285Updated 2 years ago
- MISP trainings, threat intel and information sharing training materials with source code☆389Updated this week
- User guide of MISP☆259Updated last month
- PCAP Samples for Different Post Exploitation Techniques☆344Updated 3 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆122Updated 6 months ago
- Resources To Learn And Understand SIGMA Rules☆168Updated last year
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆285Updated 7 years ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆181Updated 2 years ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆138Updated 2 months ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆144Updated 8 months ago
- A knowledge base of actionable Incident Response techniques☆614Updated 2 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆556Updated 2 weeks ago
- A modular OSINT honeypot for blue teamers☆329Updated last year
- Zeek-Formatted Threat Intelligence Feeds☆343Updated this week
- This content is analysis and research of the data sources currently listed in ATT&CK.☆407Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆325Updated 3 weeks ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆232Updated 7 months ago
- A curated repository of incident response playbooks☆63Updated last year
- DFIRTrack - The Incident Response Tracking Application☆482Updated 2 months ago