An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.
☆85Mar 14, 2026Updated last week
Alternatives and similar repositories for awesome-deception
Users that are interested in awesome-deception are comparing it to the libraries listed below
Sorting:
- ☆42Nov 13, 2025Updated 4 months ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- ☆18Feb 2, 2026Updated last month
- ☆23Mar 4, 2025Updated last year
- WALA 学习笔记☆14Aug 8, 2023Updated 2 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Public rules and samples for various automations through LimaCharlie.io☆14Dec 16, 2021Updated 4 years ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 3 months ago
- C2 writen in Rust & Go powered by Tor network.☆151Oct 30, 2025Updated 4 months ago
- MuonFP is an enterprise ready, TCP passive fingerprinter written in Rust that has no external dependencies such as WireShark or other ope…☆29Dec 12, 2025Updated 3 months ago
- Patched Bash 3.2.24 to log all actions to syslog☆13Dec 16, 2017Updated 8 years ago
- ☆145Aug 7, 2025Updated 7 months ago
- A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE☆76Mar 12, 2026Updated last week
- Comprehensive pfSense deployment, monitoring, and security knowledge base: From basic configuration to advanced SIEM infrastructure, IDS/…☆22Updated this week
- Generate test data that is not only realistic but also contextually meaningful☆28Jun 30, 2023Updated 2 years ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated last month
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 4 months ago
- Manage legacy code with comments.☆17Updated this week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Jan 30, 2026Updated last month
- Go keychain management library☆10Aug 5, 2019Updated 6 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- Seamless remote browser session control☆232Jan 28, 2026Updated last month
- ☆39Oct 9, 2025Updated 5 months ago
- Canary Detection☆193Oct 20, 2025Updated 5 months ago
- A collection of scripts for use with CrowdStrike Falcon RTR☆19Oct 4, 2024Updated last year
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆120Jun 10, 2025Updated 9 months ago
- If these strings are in your code, you might have a problem!☆51Feb 13, 2026Updated last month
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Updated this week
- Resources I've found useful for my CTI work☆12Dec 27, 2023Updated 2 years ago
- OID-See is an identity attack surface mapping tool that models OAuth trust, persistence, and impersonation paths in Entra using a graph-b…☆33Jan 19, 2026Updated 2 months ago
- Privacy, security, ad blocking, and VPN tunneling, end to end, free, in your control, and made easy.☆19Sep 24, 2022Updated 3 years ago
- ☆21Dec 18, 2024Updated last year
- An autonomous OSINT agent for social media using any OpenAI-compatible API for deep analysis and reporting.☆52Feb 27, 2026Updated 3 weeks ago
- Read Windows message table entries.☆11Feb 5, 2023Updated 3 years ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- 🫂 A toolkit that adds extra functionality to niri☆31Jan 11, 2026Updated 2 months ago
- ☆39Jul 1, 2025Updated 8 months ago
- Sample code for finding AWS Account ID of an S3 bucket.☆49Feb 23, 2024Updated 2 years ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Sep 5, 2025Updated 6 months ago