You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Deception Engineering toolkit for T-Pot that re-skins Cowrie, Conpot, and Suricata into realistic OT, ICS, and enterprise honeypot personas with automated hostnames, banners, MACs, and container metadata.
Host Intrusion Detection & Active Signaling System (HIDASS) leveraging Linux eBPF tracepoints and Game Theory (Stackelberg Model). Instead of blocking threats, it injects a calibrated Bayesian exponential jitter into compromised TTY descriptors to force behavioral disclosure from APTs. 4-crate memory-safe production-grade Rust workspace.