Deceptgold is a next-generation platform designed to manage deception strategies and reclaim value from cyber attacks. While most organizations focus only on detection, logging, and mitigation, Deceptgold takes a radically different approach: it transforms the computational effort of intrusion attempts into valuable digital assets.
In today's threat landscape, companies suffer not only from data breaches but also from a massive waste of computational power during attacks. Countless CPU cycles, network bandwidth, and system resources are consumed by malicious actors β and traditionally, all this energy is simply lost.
By deploying deceptive environments that interact with attackers in a controlled and intelligent way, the system is able to capture and redirect the power of attacks, converting what would otherwise be waste into tangible assets for the defending organization. This turns an inherently negative event β being targeted β into a source of intelligence, strategic advantage, and even economic value.
Deceptgold is ideal for cybersecurity teams, researchers, and critical infrastructure defenders who want more than just alerts. It is built for those who believe that every intrusion attempt is an opportunity β not just a threat.
- Whitepaper - Project vision and technical details
- Architecture - System design and components
- Getting Started - Quick start for developers
- API Reference - Complete command reference
# Clone repository
git clone https://github.com/new-resolve/deceptgold.git
cd deceptgold/deceptgold
# Install dependencies
poetry install
poetry shell
# Run application
poetry run briefcase dev --# Configure wallet address
deceptgold user --my-address 0xYourWalletAddress
# Start honeypot service
deceptgold service start
# Check status
deceptgold service status
# View token balance
deceptgold user --show-balanceWe welcome contributions! Please read our guidelines:
- Contributing Guide - How to contribute
- Development Guide - Setup and workflow
- Testing Guide - Testing procedures
# Install development dependencies
poetry install --with dev,docs
# Run tests
poetry run pytest
# Build documentation
poetry run mkdocs serve- Architecture Overview - System design
- Blockchain Integration - Smart contracts and Web3
- Testing Guide - Test structure and examples
- Deploy Honeypots - Attract attackers with realistic decoy services
- Capture Attacks - Log and cryptographically sign attack attempts
- Verify On-Chain - Smart contracts validate signatures
- Mint Tokens - Receive ERC-20 tokens for verified attacks
- Gain Intelligence - Use tokens to access threat intelligence
- β Multi-Service Honeypots - SSH, HTTP, FTP, MySQL, SMB, and more
- β Blockchain Tokenization - ERC-20 tokens for verified attacks
- β Cryptographic Integrity - ECDSA signatures ensure authenticity
- β Anti-Farming - Sophisticated mechanisms prevent self-farming
- β Real-Time Notifications - Telegram, Slack, Discord, webhooks
- β Cross-Platform - Linux, Windows, macOS support
- β Threat Intelligence - Convert tokens into actionable insights
poetry install
poetry run briefcase dev --# Debian/Ubuntu
sudo dpkg -i deceptgold.deb
# Fedora
sudo rpm -i deceptgold.rpm
# macOS
sudo installer -pkg deceptgold.pkg -target /Help fund the project with crowdfunding: 0x99eF54CDe7EaD64Ed49E78086fCF2ea98Ec4e102 !
This project is licensed under the Deceptgold License. See LICENSE for details.
- Email: contact@decept.gold
- Website: https://decept.gold
- GitHub: https://github.com/new-resolve/deceptgold
Transform threats into opportunities with Deceptgold. π‘οΈβ¨
49a4295 (doc: added others documentations)
