Deception-as-Detection Logo

Deception-as-Detection

0
Free
Visit Website

Deception based detection techniques mapped to the MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™): Windows Technique Matrix Linux Technique Matrix Mac Technique Matrix. Deception Stories: A sample deception story is created as a reference. More deception stories will be added soon. Stay tuned! A Useful List of Honey Resources. TODO: Complete other techniques, Add more deception stories, Add Cloud-based deception stories.

FEATURES

ALTERNATIVES

NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.

Yara rule generator using VirusTotal code similarity feature code-similar-to.

Repository containing IoCs related to Volexity's threat intelligence blog posts and tools.

A threat hunting tool for Windows event logs to detect APT movements and decrease the time to uncover suspicious activity.

Scan files with Yara, match findings to VirusTotal comments.

A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.

API for querying domain security information, categorization, and related data.

A comprehensive and unrestricted dataset of security incidents for research and decision-making