An awesome list of resources on deception-based security with honeypots and honeytokens
-
Updated
Dec 23, 2024
8000
An awesome list of resources on deception-based security with honeypots and honeytokens
MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.
Koney is a Kubernetes operator that enables you to define so-called deception policies for your cluster. Koney automates the setup, rotation, and teardown of honeytokens and fake API endpoints, and uses eBPF to detect, log, and forward alerts when your traps have been accessed.
Controllable Fake Document Infilling for Cyber Deception (Findings of EMNLP 2022)
This prototype hooks into the send and receive functions of glibc to insert deceptive elements into HTTP packets.
FLUIDOS Cyber Deception service
An updated compilation of tools, frameworks, references, and papers relating to cognition-based defenses.
Junk credential generator for SQL in CSV format, intended to introduce uncertainty to attacker exfiltrated data.
This project is about how honeypots can be misused to potentially perform DDoS attacks. It has the code to reproduce our work for the DTU course 02334-Research Topics For CyberSecurity.
An awesome list of resources on AI cyber deception, exploring adversarial machine learning techniques used to deceive and secure systems
An awesome list of resources on AI cyber deception, exploring adversarial machine learning techniques used to deceive and secure systems
Add a description, image, and links to the cyber-deception topic page so that developers can more easily learn about it.
To associate your repository with the cyber-deception topic, visit your repo's landing page and select "manage topics."