Deception-as-Detection Logo

Deception-as-Detection

0
Free
Visit Website

Deception based detection techniques mapped to the MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™): Windows Technique Matrix Linux Technique Matrix Mac Technique Matrix. Deception Stories: A sample deception story is created as a reference. More deception stories will be added soon. Stay tuned! A Useful List of Honey Resources. TODO: Complete other techniques, Add more deception stories, Add Cloud-based deception stories.

FEATURES

ALTERNATIVES

Open Source Intelligence solution for threat intelligence data enrichment and quick analysis of suspicious files or malware.

Vectra AI offers an AI-driven Attack Signal Intelligence platform that uses advanced machine learning to detect and respond to cyber threats across hybrid cloud environments.

Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.

Analyze suspicious files, domains, IPs, and URLs to detect malware and other breaches, and share results with the security community.

A serverless application for creating and monitoring URL tokens with threat intelligence and customizable alerts.

A Linux distribution designed for threat emulation and threat hunting, integrating attacker and defender tools for identifying threats in your environment.

A Splunk app mapped to MITRE ATT&CK to guide threat hunts.

The Ransomware Tool Matrix is a repository that lists and categorizes tools used by ransomware gangs, aiding in threat hunting, incident response, and adversary emulation.