Deception-as-Detection Logo

Deception-as-Detection

0
Free
Visit Website

Deception based detection techniques mapped to the MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™): Windows Technique Matrix Linux Technique Matrix Mac Technique Matrix. Deception Stories: A sample deception story is created as a reference. More deception stories will be added soon. Stay tuned! A Useful List of Honey Resources. TODO: Complete other techniques, Add more deception stories, Add Cloud-based deception stories.

FEATURES

ALTERNATIVES

Tool for dataviz and statistical analysis of threat intelligence feeds, presented in cybersecurity conferences for measuring IQ of threat intelligence feeds.

A summary of the threat modeling posts and final thoughts on the process

Python-based client for IBM XForce Exchange with an improved version available.

PolySwarm is a malware intelligence marketplace that aggregates threat detection engines to provide early detection, unique samples, and higher accuracy.

LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.

Curated datasets for developing and testing detections in SIEM installations.

A daily collection of IOCs from various sources, including articles and tweets.

Container of 200 Windows EVTX samples for testing detection scripts and training on DFIR.