Explore the cutting-edge framework ‘DOLOST,’ designed to innovate the field of cyber deception.
This tool automates the deployment of decoys and deceptive environments, enhancing security strategies.
Learn how DOLOST not only creates but also meticulously designs these operations to outsmart and trap potential threats.
DOLOST is a framework designed to automate the creation and deployment of decoys and deceptive environments in the context of cyber deception operations.
It also guides the design of deception operations with a deep understanding of engagement strategies.
# Python 3.7+ required
$ python3 -m venv .venv
$ source .venv/bin/activate
$ pip install DOLOST
3. Final Checks:Ensure that all required dependencies are installed without any errors.
If you encounter any issues during the installation process, refer to the error messages for troubleshooting steps.
To use the framework you need to start it with a first definition of the Docker client to connect with.
Here you have an example for DOLOST execution:
import DOLOST
# Available Docker Client configuration:
# - from_env: Will try to use the current environment configuration to reach dockerd.
# - tcp: Will use the provided host and port to reach dockerd.
# - tcp_ssl: Will use the provided host and port + the SSL certificates to reach dockerd using TCP+SSL.
# - socket: Will use the provided socket path to reach dockerd.
# For more detailed information, refer to "Configuring Docker Client" in the Documentation.
dc = {'from_env': True}
# Available Verbosity Levels:
# - TRACE: Provides detailed tracing information.
# - DEBUG: Displays debug messages for troubleshooting.
# - INFO: Provides general information about the execution.
# - WARN: Displays warnings for potential issues.
# - ERROR: Indicates errors that occurred during execution.
# Note: Each verbosity level includes all levels above it. For example,
# setting verbosity to DEBUG will also display INFO, WARN, and ERROR messages.
verbosity = "INFO"
if __name__ == "__main__":
DOLOST.start(verbosity=verbosity, docker_client=dc)
This repo contains all variants of information security & Bug bounty & Penetration Testing write-up…
site:*/sign-in site:*/account/login site:*/forum/ucp.php?mode=login inurl:memberlist.php?mode=viewprofile intitle:"EdgeOS" intext:"Please login" inurl:user_login.php intitle:"Web Management Login" site:*/users/login_form site:*/access/unauthenticated site:account.*.*/login site:admin.*.com/signin/…
Matrix is an open network for secure and decentralized communication. Users from every Matrix homeserver…
Linux Security And Monitoring Scripts are a collection of security and monitoring scripts you can…
A fiber is a unit of execution that must be manually scheduled by the application…
XSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site…