Visit Website

Deception based detection techniques mapped to the MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™): Windows Technique Matrix Linux Technique Matrix Mac Technique Matrix. Deception Stories: A sample deception story is created as a reference. More deception stories will be added soon. Stay tuned! A Useful List of Honey Resources. TODO: Complete other techniques, Add more deception stories, Add Cloud-based deception stories.

FEATURES

ALTERNATIVES

A library of adversary emulation plans to evaluate defensive capabilities against real-world threats.

Open Source Threat Intelligence Gathering and Processing Framework

Stay informed with Rapid7's cybersecurity blog and vulnerability news updates.

Maltego transform pack for analyzing and graphing Honeypots using MySQL data.

A framework for managing cyber threat intelligence in structured formats.

In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.

Open source web app for storing and searching Actor related data from users and public repositories.

Tools to export data from MISP MySQL database for post-incident analysis and correlation.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved