An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.
☆84Updated this week
Alternatives and similar repositories for awesome-deception
Users that are interested in awesome-deception are comparing it to the libraries listed below
Sorting:
- 安全好文整理,松鼠症患者福音☆13Nov 30, 2023Updated 2 years ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- ☆42Nov 13, 2025Updated 3 months ago
- WALA 学习笔记☆14Aug 8, 2023Updated 2 years ago
- redc use template | redc 使用模版库☆41Updated this week
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated 11 months ago
- ☆18Feb 2, 2026Updated 3 weeks ago
- ☆23Mar 4, 2025Updated 11 months ago
- A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE☆75Feb 13, 2026Updated 2 weeks ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆79Sep 1, 2025Updated 5 months ago
- ☆140Aug 7, 2025Updated 6 months ago
- 一个基于分布式爬虫的信安文章搜索引擎☆27May 22, 2023Updated 2 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- Make your programs stealthier🐝☆202Jun 12, 2025Updated 8 months ago
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆21Oct 6, 2025Updated 4 months ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆176Feb 20, 2026Updated last week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Jan 30, 2026Updated last month
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆70Nov 27, 2025Updated 3 months ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆98Updated this week
- ☆46Nov 7, 2024Updated last year
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆24Nov 12, 2025Updated 3 months ago
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- Mooder是一款开源、安全、简洁、强大的团队内部知识分享平台。☆15Jul 3, 2025Updated 7 months ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- This is the official repository for files needed to complete certain challenges for DawgCTF Spring 2025.☆10Apr 19, 2025Updated 10 months ago
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- Web Application Firewall (WAF) Enhanced with AI through Autonomous Dynamic Learning and Generative Models☆14Updated this week
- Next-generation IaC tools | 下一代基础设施管理工具☆119Updated this week
- ☆22Aug 29, 2025Updated 6 months ago
- C2 writen in Rust & Go powered by Tor network.☆152Oct 30, 2025Updated 4 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆119Jun 10, 2025Updated 8 months ago
- Identifying malicious/benign network traffic using classification methods.☆10Sep 27, 2022Updated 3 years ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆26Jul 11, 2025Updated 7 months ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 2 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month