Today, I'm excited to introduce Dolus - not as a revolutionary new concept, but as a fresh approach to making advanced cyber deception techniques accessible to everyone.

What is Dolus?

Imagine putting up a "Beware of Dog" sign in your yard, even if you don't actually have a dog. Potential intruders see the sign and think twice before entering. Dolus works in a similar way, but for your computer or network.

How Does It Work?

Dolus creates the digital equivalent of that "Beware of Dog" sign. It makes your system appear as if it's an environment that viruses and malware wouldn't want to target. We make your computer look like it might be a malware analysis system or a virtual machine (VM) – places where malicious software knows it's likely to be caught and studied, rather than finding a real, vulnerable target.

Why is This Important?

In the digital world, many attacks are automated. Malware and viruses often scan potential targets before deciding whether to attack. By making your system look unattractive or potentially dangerous to these automated threats, Dolus can prevent many attacks before they even begin. It's not about being more secure in the traditional sense; it's about making potential threats think twice before they try anything.

Standing on the Shoulders of Giants

Let's be clear from the outset: Dolus isn't reinventing the wheel. The techniques we're using have been around for years, widely discussed in the cybersecurity community and implemented in various open-source scripts. What sets Dolus apart isn't the underlying concept, but how we're packaging and delivering it.

Bridging the Gap

In the world of cybersecurity, there's often a significant divide between cutting-edge techniques and everyday users. Security researchers and professionals have long known the value of cyber deception, but implementing these strategies has typically required a level of expertise that's out of reach for most people.

That's where Dolus comes in. We're not claiming to have invented cyber deception. Instead, we're focused on democratizing these powerful techniques, making them available to everyone - from security novices to seasoned professionals.

The Dolus Difference: Community, Trust, and Usability

So, what makes Dolus special? It's our approach:

  1. Community-Oriented Platform: We're building more than just a tool; we're fostering a community. Our platform allows security researchers and developers to share their expertise through modules, while enabling end-users to benefit from this collective knowledge.

  2. Provenance and Trust: In the world of cybersecurity, trust is paramount. That's why we've implemented a rigorous system for verifying, signing, and notarizing modules. When you use a Dolus module, you can trace its origin and be confident in its safety.

  3. User-Friendly Design: For end-users, we've focused on creating something that "just works." Install Dolus, turn it on, and you're protected - no advanced knowledge required.

  4. Developer Tooling: For the experts, we're providing a robust foundation. Instead of starting from scratch, developers can use our platform to focus on creating innovative protections without getting bogged down in implementation details.

The Imitation Engine: Simplifying Complexity

At the core of Dolus is our Imitation Engine. It's designed to lower the barrier to entry for both users and developers:

  • For Users: The engine runs modules that create deceptive elements on your system, making it less attractive to potential attackers. You don't need to understand the intricacies - just install and activate.

  • For Developers: Create modules by describing desired behaviors, without diving into low-level system programming. Our engine handles the complex stuff, letting you focus on creative protection strategies.

The module playground and development environment is embedded below:

Looking Ahead

While our initial release provides a solid foundation, we're not stopping here. We're already working on "Ring 1" features that will allow for even more sophisticated deceptions, including virtual hardware and advanced system mimicry.

Join the Community

Dolus is available now. You can install it here. If you wish to subscribe, you can get 25% off the first year by using the code YYMDKZMW at checkout.

For those interested in developing modules or diving deeper into the platform, visit My Dolus or try out our Module Playground.

If you want to check out some code, visit our Github.

We're not here to replace your existing security measures. Instead, we're offering an additional layer of protection that works alongside your current tools. By making advanced cyber deception techniques accessible to all, we're aiming to create a more secure digital ecosystem for everyone.

Want to learn more or get involved? Join our Discord community. We're excited to see how the community will grow and shape the future of Dolus.

Welcome to a more accessible approach to cyber deception. Welcome to Dolus.


A special thank you to my amazing girlfriend for her support as I crunched to release this. Dolus was made with ❤️ in Japan.