This project is designed to create deceptive webpages to deceive and redirect attackers away from real websites. The deceptive webpages are generated by cloning real websites, specifically their login pages. For further reading material on the tool development, please visit our blog. Getting Started The project is composed of two tools: - Web Cloner: Responsible for cloning real websites and creating the deceptive webpage. - Deceptive Web server: Responsible for serving the cloned webpages, and reporting to a syslog server upon requests. Operating System The project was designed and tested on an Ubuntu 16.04 machine. Prerequisites - pip install requests - apt install gir1.2-webkit2-3.0 python-gi python-gi-cairo python3-gi python3-gi-cairo gir1.2-gtk-3.0 How to use How to use the Web Cloner: usage: WebCloner.py [-h] [-o OUTPUT_DIRECTORY] website_url positional arguments: website_url: The URL path to the web page you desire to clone optional arguments: -h, --help: show this help message and exit -o OUTPUT_DIRECTORY, --output-directory OUTPUT_DIRECTORY: Setting the output directory for the cloned webpage How to run the Deceptive web server: usage: TrapServer.py [-h] [--webroot-directory W
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Sigma is a generic and open signature format for SIEM systems and other security tools to detect and respond to threats.
Gathers Threat Intelligence Feeds from publicly available sources and provides detailed output in CSV format.
The Trystero Project is a threat intelligence platform that measures email security efficacy and provides various tools and resources, while VMware Carbon Black offers endpoint protection and workload security solutions.
SecurityTrails API provides access to a vast repository of historical DNS lookups, WHOIS records, hostnames, and domains for cyber forensics and investigations.
A community-driven list of sample security analytics for auditing cloud usage and detecting threats in Google Cloud.
Robust Python SDK and Command Line Client for interacting with IntelOwl's API.
A robust Python implementation of TAXII Services with a friendly pythonic API.
A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.
A threat intelligence platform that monitors, analyzes, and provides detailed information about threat actors targeting non-human identities across various industries.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.