GitHub topics: cyber-deception
raditz22/Awesome-AI-Deception
An awesome list of resources on AI cyber deception, exploring adversarial machine learning techniques used to deceive and secure systems
Size: 4.88 KB - Last synced at: 1 day ago - Pushed at: 1 day ago - Stars: 3 - Forks: 0

dynatrace-oss/koney
Koney is a Kubernetes operator that enables you to define so-called deception policies for your cluster. Koney automates the setup, rotation, and teardown of honeytokens and fake API endpoints, and uses eBPF to detect, log, and forward alerts when your traps have been accessed.
Language: Go - Size: 224 KB - Last synced at: 10 days ago - Pushed at: 18 days ago - Stars: 50 - Forks: 5

NicPWNs/asymmetric-cyber-defense
Cheap techniques for cyber defenders and headaches for cyber attackers.
Size: 12.7 KB - Last synced at: 7 days ago - Pushed at: about 2 months ago - Stars: 1 - Forks: 0

tolgadevsec/Awesome-Deception
An awesome list of resources on deception-based security with honeypots and honeytokens
Size: 206 KB - Last synced at: 11 days ago - Pushed at: 9 months ago - Stars: 175 - Forks: 27

fluidos-project/cyber-deception
FLUIDOS Cyber Deception service
Size: 690 KB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 2 - Forks: 0

mitre/engage
MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.
Size: 57.4 MB - Last synced at: about 1 month ago - Pushed at: over 1 year ago - Stars: 65 - Forks: 11

dynatrace-research/ld-preload-deception
This prototype hooks into the send and receive functions of glibc to insert deceptive elements into HTTP packets.
Language: C - Size: 106 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 5 - Forks: 0

0xNslabs/Awesome-AI-Deception
An awesome list of resources on AI cyber deception, exploring adversarial machine learning techniques used to deceive and secure systems
Size: 4.88 KB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Mirtia/Sticky-Situation_Exploiting-Honeypots-for-DDoS
This project is about how honeypots can be misused to potentially perform DDoS attacks. It has the code to reproduce our work for the DTU course 02334-Research Topics For CyberSecurity.
Size: 645 KB - Last synced at: 7 days ago - Pushed at: 8 months ago - Stars: 1 - Forks: 0

peacock4o/Can-D
Junk credential generator for SQL in CSV format, intended to introduce uncertainty to attacker exfiltrated data.
Language: Python - Size: 758 KB - Last synced at: 7 months ago - Pushed at: about 1 year ago - Stars: 2 - Forks: 0

peacock4o/CBaD-resources
An updated compilation of tools, frameworks, references, and papers relating to cognition-based defenses.
Size: 53.7 KB - Last synced at: 7 months ago - Pushed at: about 1 year ago - Stars: 2 - Forks: 0

snowood1/FDI
Controllable Fake Document Infilling for Cyber Deception (Findings of EMNLP 2022)
Language: Jupyter Notebook - Size: 4.24 MB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 3 - Forks: 0
