Deception based detection techniques mapped to the MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™): Windows Technique Matrix Linux Technique Matrix Mac Technique Matrix. Deception Stories: A sample deception story is created as a reference. More deception stories will be added soon. Stay tuned! A Useful List of Honey Resources. TODO: Complete other techniques, Add more deception stories, Add Cloud-based deception stories.
Common questions about Deception-as-Detection including features, pricing, alternatives, and user reviews.
Deception-as-Detection is Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources. It is a Security Operations solution designed to help security teams with Mac Os, Windows Security, Linux.
Deception-as-Detection is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/0x4D31/deception-as-detection/ for download and installation instructions.
Popular alternatives to Deception-as-Detection include:
Compare all Deception-as-Detection alternatives at https://cybersectools.com/alternatives/deception-as-detection
Deception-as-Detection is for security teams and organizations that need Mac Os, Windows Security, Linux. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Head-to-head feature, pricing, and rating breakdowns.
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
PhoneyC is a client-side honeypot that emulates vulnerable web browsers to detect and analyze malicious web content and browser-based exploits.
A simpler version of a honeypot that looks for connections from external parties and performs a specific action, usually blacklisting.