Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
#

deception

Here are 106 public repositories matching this topic...

tpotce

🍯 T-Pot - The All In One Multi Honeypot Platform 🐝

  • UpdatedJan 29, 2026
  • C
cowriebeelzebub

安全、快捷、高交互、企业级的蜜罐管理系统,护网;支持多种协议蜜罐、蜜签、诱饵等功能。A safe, fast, highly interactive and enterprise level honeypot management system, supports multiple protocol honeypots, honeytokens, baits and other functions.

  • UpdatedOct 17, 2023
  • Go
HellPot

HellPot is a cross-platform portal to endless suffering meant to punish unruly HTTP bots.

  • UpdatedDec 19, 2025
  • Go

honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top of AWS Lambda and Amazon API Gateway

  • UpdatedOct 20, 2018
  • Python

OWASP Honeypot, Automated Deception Framework.

  • UpdatedSep 15, 2024
  • Python

🐝 A highly scalable, safe, free enterprise honeypots 一款高可扩展、安全、免费的企业级蜜罐系统

  • UpdatedJul 18, 2024
  • Shell
Krawl

Krawl is a customizable lightweight cloud native web deception server and anti-crawler that creates fake web applications with low-hanging vulnerabilities and realistic, randomly generated decoy data

  • UpdatedFeb 18, 2026
  • Python

A system that may trick hackers. 针对黑客的拟态欺骗系统。

  • UpdatedNov 20, 2025
  • Go

A web honeypot library to create vulnerable-looking endpoints to detect and mislead attackers

  • UpdatedJan 14, 2025
  • Go

DejaVU - Open Source Deception Framework

  • UpdatedAug 2, 2025
  • PHP

Credentials catching honeypot

  • UpdatedMay 21, 2024
  • Python

Deception based detection techniques mapped to the MITRE’s ATT&CK framework

  • UpdatedOct 28, 2017

Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act on them: block, reroute, tarpit, or deceive in real time.

  • UpdatedDec 6, 2025
  • Go

A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the attacker toward your honeypots

  • UpdatedMar 20, 2019
  • Go

A PowerShell module to deploy active directory decoy objects.

  • UpdatedNov 17, 2019
  • PowerShell

HTTP honeypot to punish and educate unruly web crawlers, written in Rust (🚀)

  • UpdatedFeb 3, 2026
  • Rust

Add a layer of active defense to your cloud applications.

  • UpdatedFeb 11, 2026
  • JavaScript

Voice stress analysis (VSA) aims to differentiate between stressed and non-stressed outputs in response to stimuli (e.g., questions posed), with high stress seen as an indication of deception. In this work, we propose a deep learning-based psychological stress detection model using speech signals. With increasing demands for communication betwee…

  • UpdatedOct 18, 2021
  • Jupyter Notebook

Improve this page

Add a description, image, and links to thedeception topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with thedeception topic, visit your repo's landing page and select "manage topics."

Learn more


[8]ページ先頭

©2009-2026 Movatter.jp