Skip to content

DeceptGold redefines cybersecurity by converting attack efforts into digital assets. Unlike traditional defenses, it captures wasted computational power from intrusions, transforming CPU cycles and bandwidth into strategic and economic value. Ideal for cybersecurity teams and critical infrastructure, DeceptGold makes every attack an opportunity.

License

Notifications You must be signed in to change notification settings

New-Resolve/deceptgold

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Deceptgold - Cyber Deception and Resource Inversion

Build Last Commit Docs Python License: DeceptGold


Deceptgold is a next-generation platform designed to manage deception strategies and reclaim value from cyber attacks. While most organizations focus only on detection, logging, and mitigation, Deceptgold takes a radically different approach: it transforms the computational effort of intrusion attempts into valuable digital assets.

In today's threat landscape, companies suffer not only from data breaches but also from a massive waste of computational power during attacks. Countless CPU cycles, network bandwidth, and system resources are consumed by malicious actors β€” and traditionally, all this energy is simply lost.

Deceptgold solves this problem.

By deploying deceptive environments that interact with attackers in a controlled and intelligent way, the system is able to capture and redirect the power of attacks, converting what would otherwise be waste into tangible assets for the defending organization. This turns an inherently negative event β€” being targeted β€” into a source of intelligence, strategic advantage, and even economic value.

Deceptgold is ideal for cybersecurity teams, researchers, and critical infrastructure defenders who want more than just alerts. It is built for those who believe that every intrusion attempt is an opportunity β€” not just a threat.

πŸ“š Documentation

πŸš€ Quick Start

Installation

# Clone repository
git clone https://github.com/new-resolve/deceptgold.git
cd deceptgold/deceptgold

# Install dependencies
poetry install
poetry shell

# Run application
poetry run briefcase dev --

Basic Usage

# Configure wallet address
deceptgold user --my-address 0xYourWalletAddress

# Start honeypot service
deceptgold service start

# Check status
deceptgold service status

# View token balance
deceptgold user --show-balance

πŸ› οΈ For Developers

Contributing

We welcome contributions! Please read our guidelines:

Development Setup

# Install development dependencies
poetry install --with dev,docs

# Run tests
poetry run pytest

# Build documentation
poetry run mkdocs serve

Key Resources

πŸ’‘ How It Works

attacks_revenue.png

<<<<<<< HEAD Help fund the project with crowdfunding: 0x99eF54CDe7EaD64Ed49E78086fCF2ea98Ec4e102 .

  1. Deploy Honeypots - Attract attackers with realistic decoy services
  2. Capture Attacks - Log and cryptographically sign attack attempts
  3. Verify On-Chain - Smart contracts validate signatures
  4. Mint Tokens - Receive ERC-20 tokens for verified attacks
  5. Gain Intelligence - Use tokens to access threat intelligence

🌟 Features

  • βœ… Multi-Service Honeypots - SSH, HTTP, FTP, MySQL, SMB, and more
  • βœ… Blockchain Tokenization - ERC-20 tokens for verified attacks
  • βœ… Cryptographic Integrity - ECDSA signatures ensure authenticity
  • βœ… Anti-Farming - Sophisticated mechanisms prevent self-farming
  • βœ… Real-Time Notifications - Telegram, Slack, Discord, webhooks
  • βœ… Cross-Platform - Linux, Windows, macOS support
  • βœ… Threat Intelligence - Convert tokens into actionable insights

πŸ“¦ Installation Options

From Source (Development)

poetry install
poetry run briefcase dev --

From Package (Production)

# Debian/Ubuntu
sudo dpkg -i deceptgold.deb

# Fedora
sudo rpm -i deceptgold.rpm

# macOS
sudo installer -pkg deceptgold.pkg -target /

🀝 Support the Project

Help fund the project with crowdfunding: 0x99eF54CDe7EaD64Ed49E78086fCF2ea98Ec4e102 !

πŸ“„ License

This project is licensed under the Deceptgold License. See LICENSE for details.

πŸ“§ Contact


Transform threats into opportunities with Deceptgold. πŸ›‘οΈβœ¨

49a4295 (doc: added others documentations)

About

DeceptGold redefines cybersecurity by converting attack efforts into digital assets. Unlike traditional defenses, it captures wasted computational power from intrusions, transforming CPU cycles and bandwidth into strategic and economic value. Ideal for cybersecurity teams and critical infrastructure, DeceptGold makes every attack an opportunity.

Topics

Resources

License

Contributing

Stars

Watchers

Forks

Packages

No packages published

Contributors 3

  •  
  •  
  •