deception
Here are 104 public repositories matching this topic...
An easy-to-use smartphone app for the response time concealed information test.
-
Updated
Aug 5, 2021 - TypeScript
Honeypot for file uploads. Written in Go.
-
Updated
Jan 24, 2026 - Go
This project is coding for fun. It will be using heuristic and metaheuristic algorithm to optimize problems. All code will be conducted by c++.
-
Updated
Sep 8, 2021 - C++
LLM agents learn to lie in a dating marketplace and honest agents quit. A multi-agent simulation proving AI can exploit information asymmetry.
-
Updated
Jan 31, 2026 - Python
A deception-based SSH honeypot that simulates a forgotten dev box to study attacker behavior.
-
Updated
Jun 29, 2025 - Shell
A simple, low-interaction TELNET honeypot server in Python for easy network traffic monitoring
-
Updated
Dec 23, 2025 - Python
Deception-based security framework integrating digital twin and ethereum blockchain.
-
Updated
Jul 1, 2025 - C#
Fallax is a modern phishing detection web app that helps users identify suspicious URLs before clicking.
-
Updated
Jul 31, 2025 - TypeScript
A simple SSH gateway for deception deployments
-
Updated
Jul 8, 2024 - Go
🕷️ Daedric deception platform — ML-powered honeypot with SSH/HTTP/FTP traps and real-time threat intelligence
-
Updated
Dec 3, 2025 - Python
Enterprise deception technology capturing attacker TTPs | SSH + HTTP honeypots with real-time dashboard |
-
Updated
Sep 7, 2025 - Python
1st International Workshop on Deceptive AI @ECAI2020
-
Updated
Jul 10, 2020 - Python
This is a computational framework to analyze raw biological data generated from a polygraph test for the purpose of making psychophysiological inferences.
-
Updated
Jan 28, 2019 - Python
The Kill Chain Evolution of a Middle Eastern Threat Actor Intelligence from Seventeen Months of Deception and Analysis of Politically Targeted Malware Attacks
-
Updated
May 31, 2024
DeceptGold redefines cybersecurity by converting attack efforts into digital assets. Unlike traditional defenses, it captures wasted computational power from intrusions, transforming CPU cycles and bandwidth into strategic and economic value. Ideal for cybersecurity teams and critical infrastructure, DeceptGold makes every attack an opportunity.
-
Updated
Feb 1, 2026 - Python
High-performance stealth redirector and deception gateway. Traffic filtering with GeoIP, ASN, rate limiting, and boolean rule logic. Reverse proxy with health checks, load balancing, decoys, and tarpit responses.
-
Updated
Dec 7, 2025 - Go
🛡️ Capture and analyze DNS traffic effortlessly with a simple honeypot setup. Gain insights into curiosity, misconfigurations, and security threats.
-
Updated
Feb 7, 2026
The Honeypot Adoption Program aims to take care of orphans honeypots that are not longer maintained by their owners in order to preserve them in a functional state.
-
Updated
Dec 28, 2022
Improve this page
Add a description, image, and links to the deception topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the deception topic, visit your repo's landing page and select "manage topics."