Deception-as-Detection
Deception based detection techniques mapped to the MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™): Windows Technique Matrix Linux Technique Matrix Mac Technique Matrix. Deception Stories: A sample deception story is created as a reference. More deception stories will be added soon. Stay tuned! A Useful List of Honey Resources. TODO: Complete other techniques, Add more deception stories, Add Cloud-based deception stories.
FEATURES
ALTERNATIVES
A library of adversary emulation plans to evaluate defensive capabilities against real-world threats.
Stay informed with Rapid7's cybersecurity blog and vulnerability news updates.
Maltego transform pack for analyzing and graphing Honeypots using MySQL data.
A framework for managing cyber threat intelligence in structured formats.
In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.
Open source web app for storing and searching Actor related data from users and public repositories.
Tools to export data from MISP MySQL database for post-incident analysis and correlation.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.