An open API service providing repository metadata for many open source software ecosystems.

GitHub topics: cyber-deception

raditz22/Awesome-AI-Deception

An awesome list of resources on AI cyber deception, exploring adversarial machine learning techniques used to deceive and secure systems

Size: 4.88 KB - Last synced at: 1 day ago - Pushed at: 1 day ago - Stars: 3 - Forks: 0

dynatrace-oss/koney

Koney is a Kubernetes operator that enables you to define so-called deception policies for your cluster. Koney automates the setup, rotation, and teardown of honeytokens and fake API endpoints, and uses eBPF to detect, log, and forward alerts when your traps have been accessed.

Language: Go - Size: 224 KB - Last synced at: 10 days ago - Pushed at: 18 days ago - Stars: 50 - Forks: 5

NicPWNs/asymmetric-cyber-defense

Cheap techniques for cyber defenders and headaches for cyber attackers.

Size: 12.7 KB - Last synced at: 7 days ago - Pushed at: about 2 months ago - Stars: 1 - Forks: 0

tolgadevsec/Awesome-Deception

An awesome list of resources on deception-based security with honeypots and honeytokens

Size: 206 KB - Last synced at: 11 days ago - Pushed at: 9 months ago - Stars: 175 - Forks: 27

fluidos-project/cyber-deception

FLUIDOS Cyber Deception service

Size: 690 KB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 2 - Forks: 0

mitre/engage

MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.

Size: 57.4 MB - Last synced at: about 1 month ago - Pushed at: over 1 year ago - Stars: 65 - Forks: 11

dynatrace-research/ld-preload-deception

This prototype hooks into the send and receive functions of glibc to insert deceptive elements into HTTP packets.

Language: C - Size: 106 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 5 - Forks: 0

0xNslabs/Awesome-AI-Deception

An awesome list of resources on AI cyber deception, exploring adversarial machine learning techniques used to deceive and secure systems

Size: 4.88 KB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Mirtia/Sticky-Situation_Exploiting-Honeypots-for-DDoS

This project is about how honeypots can be misused to potentially perform DDoS attacks. It has the code to reproduce our work for the DTU course 02334-Research Topics For CyberSecurity.

Size: 645 KB - Last synced at: 7 days ago - Pushed at: 8 months ago - Stars: 1 - Forks: 0

peacock4o/Can-D

Junk credential generator for SQL in CSV format, intended to introduce uncertainty to attacker exfiltrated data.

Language: Python - Size: 758 KB - Last synced at: 7 months ago - Pushed at: about 1 year ago - Stars: 2 - Forks: 0

peacock4o/CBaD-resources

An updated compilation of tools, frameworks, references, and papers relating to cognition-based defenses.

Size: 53.7 KB - Last synced at: 7 months ago - Pushed at: about 1 year ago - Stars: 2 - Forks: 0

snowood1/FDI

Controllable Fake Document Infilling for Cyber Deception (Findings of EMNLP 2022)

Language: Jupyter Notebook - Size: 4.24 MB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 3 - Forks: 0