Skip to content
#

deception-engineering

Here are 2 public repositories matching this topic...

Language: All
Filter by language

Deception Engineering toolkit for T-Pot that re-skins Cowrie, Conpot, and Suricata into realistic OT, ICS, and enterprise honeypot personas with automated hostnames, banners, MACs, and container metadata.

  • Updated Apr 9, 2026
  • Python

Host Intrusion Detection & Active Signaling System (HIDASS) leveraging Linux eBPF tracepoints and Game Theory (Stackelberg Model). Instead of blocking threats, it injects a calibrated Bayesian exponential jitter into compromised TTY descriptors to force behavioral disclosure from APTs. 4-crate memory-safe production-grade Rust workspace.

  • Updated May 20, 2026
  • Rust

Improve this page

Add a description, image, and links to the deception-engineering topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the deception-engineering topic, visit your repo's landing page and select "manage topics."

Learn more