Deception-as-Detection Logo

Deception-as-Detection

0
Free
Visit Website

Deception based detection techniques mapped to the MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™): Windows Technique Matrix Linux Technique Matrix Mac Technique Matrix. Deception Stories: A sample deception story is created as a reference. More deception stories will be added soon. Stay tuned! A Useful List of Honey Resources. TODO: Complete other techniques, Add more deception stories, Add Cloud-based deception stories.

FEATURES

ALTERNATIVES

A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.

A modular malware collection and processing framework with support for various threat intelligence feeds.

Vectra AI offers an AI-driven Attack Signal Intelligence platform that uses advanced machine learning to detect and respond to cyber threats across hybrid cloud environments.

DNSDumpster is a domain research tool for discovering and analyzing DNS records to map an organization's attack surface.

Collection of Yara rules for file identification and classification

Maltrail is a malicious traffic detection system utilizing blacklists and heuristic mechanisms.

A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.

Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.

PINNED