- Filter by
- Categories
- Tags
- Authors
- All
- Analysis
- Android
- Chapters
- Data-Mining
- Encryption
- Forensic Challenges
- Google Summer of Code
- Honeypot
- Know Your Enemy
- News
- Uncategorized
- Workshop
- All
- 2010
- 2018
- 6guard
- active defense
- Active Response Continuum
- activities
- afterglow
- afterglow cloud
- aggressive network defense
- ajgamma.liveblog.com
- AliIkinci
- Analysis
- android
- annual
- annual status report
- anti-debugging
- APIMonitor
- APK
- APKinspector android malware static analysis
- ARE
- arp spoof
- Art
- ASLR
- assembly
- attack
- Attack Graph
- Attribution
- axis
- beginner
- Beta
- Bifrozt
- blogging
- botnet
- botnet monitoring
- botnet protocols
- Botnets
- browsers under attack
- c++
- canberra
- capture-hpc
- capture-hpc honeyclient honeyspider
- carberp
- CEO
- CFG
- challenge
- challenge 2
- chapter
- Citadel
- civil process
- client
- clustering
- code of conduct
- Computer Fraud and Abuse Act
- conference
- conficker
- conpot
- control flow
- counter-attack
- criminal process
- cro
- Crowdstrike
- cuckoo
- cuckoo sandbox androguard gsoc
- cuckoo sandbox malware analysis
- d3.v2
- Dalvik
- Damballa
- data
- data link layer attacks
- data mining
- Data model Honeyweb tutorial
- data visualization
- dbscan
- DDoS
- DDOS Honeypot
- debian
- decompilation
- demo
- DEP
- dependencies
- detect
- detection
- dhcp starvation
- dionaea
- Django
- Docker
- Dorothy
- downadup
- dpkt
- droidbot
- droidbox
- dubai
- dubai2013
- Dynamic
- dynamic analysis
- dynamic malware analysis virtuaization cuckoo gsoc
- EAT filtering
- emet
- Emulation
- encrypted traffic
- encryption
- ethics
- exploit
- exploit replay
- explot
- FC10
- feature
- Feature 1
- flash
- flow
- focus
- Forensic Challenge
- Forensic Challenge 2010
- forensic challenges
- forensics
- format
- framework
- framework honeypot
- frontend
- ftp
- Fuzzy hashing
- GeoDjango
- georg
- Ghost
- glaspot
- glastopf
- GlastopNG
- globalpot
- google summer of code
- Graphviz
- greedybear
- gsoc
- gsoc 2012
- GSoC 2013
- gsoc glutton
- gsoc google
- gsoc gsoc2010
- gsoc gsoc2011
- gsoc snare tanner
- GSoC11
- GSOC2011
- gsoc2011 gsoc
- gsoc2012
- gsoc2013
- gsoc2014
- gsoc2015
- gsoc2016
- gsoc2017
- gsoc2018
- gsoc2020
- GUI
- hack back
- Hackback
- Hacking Back
- Heralding
- HeX
- high interaction honeypot
- hnw2015
- HNW2016
- honeybrid gsoc introduction
- honeybrid gsoc parser
- honeybrid gsoc redirection
- honeybrid gsoc testing
- honeyclient
- honeydrive
- honeymap
- honeyned
- honeynet
- Honeynet Blogs
- honeypot
- honeypots
- honeysink
- honeywall
- honeyweb
- Hong Kong
- Hook
- hpfeeds
- HPSoC
- hpw2012 workshop norman
- HPW2015
- http https proxy gsoc honeyproxy forensics
- hugo gonzalez
- humanitarian law
- ICS
- images
- Imalse
- improper ruse
- infection monkey
- integrity
- intelowl
- interesting
- ipv6
- IRB
- Iteolih
- Iteolih Samba DCERPC Python
- Iteolih Samba DCERPC Python libemu
- Kelihos
- Kelihos.B/Hlux.B
- kippo
- kippo SSH honeypot
- kmeans
- KYE
- KYT
- Law
- law of war
- Layer 2
- layout
- legal
- lessons learned
- libemu
- link-local
- linux
- log record
- logging
- logs
- low-interaction
- Lukas Rist
- MAC flood
- machine learning
- mahmud
- Main blog
- Malaysian Honeynet chapter
- malicious
- malware
- Malware
- malware sandbox cuckoo
- Mariposa
- Meet our new CEO Andre
- Mexican Chapter Annual Report
- Microsoft
- mitmproxy
- Mobile
- mobile HosTage
- mohpt
- Monday
- monthly
- murofet
- nebula
- network
- network traffic
- New Honeynet Project Challenge (#7): Forensic Analysis of a Compromised Server
- new version
- news
- Norway
- oxff
- paper
- parallel coordinates
- parser
- peepdf
- phoneyc
- phoneyc paper leet09 honeyclient
- picviz
- project
- project news
- protocol
- protocols
- publication
- python
- qebek
- qebek sebek qemu windows
- qebek windows
- qebek windows socket network
- qemu
- qemu hook
- qemu qebek
- question
- re-google
- readables
- reading
- release
- replay
- replica bags
- report
- reports
- research
- reverse engineering
- reversing
- ROP
- rumal
- Sambacry
- San Antonio
- sandbox
- sandbox evasion
- SCADA
- scan
- scanner
- sebek
- sebek visualization
- security
- shellcode
- shockpot
- signature
- Simpilified Chinese
- Simplified Chinese
- Simulation
- sink
- sinkhole
- smartphone
- snare
- snort
- social honeypots
- social networks
- spam
- spamscope
- spanish chapter
- speak
- spidermonkey
- splunk
- statistic
- statistics
- status
- Stavanger
- stix
- Storm Worm
- Stormfucker
- STP manipulation
- student
- Symantec
- taiwan
- takedown
- talk
- Tallinn Manual
- tanner
- taxii
- The Italian Honeynet Chapter
- the Menlo Report
- threatintel
- thug
- thug-vagrant
- tool
- tpot
- traceexploit
- Traditional Chinese
- traffic analyze
- translation
- trojan
- twman
- UI framework
- UK Chapter
- update
- vagrant
- Video
- visualization
- vlan hopping
- vulnerabilities
- Waledac
- Wannacry
- web honeypot
- web server botnet
- webhoneypot
- webservice
- White Paper
- windows
- wireshark
- wireshnork
- wordpot
- workshop
- workshop 2012 facebook
- workshop facebook
- worldmap
- zeus
- zoom
- 繁體中文
- 鑑識分析挑戰
- 香港
August 20, 2021
Published by Matteo Lodi at August 20, 2021
Categories
Student: Shubham Pandey (@sp35) Mentor: Eshaan Bansal and Matteo Lodi Organization: The Honeynet Project Project: Intel Owl Tag: Information Security Project Overview Intel Owl is an […]
November 13, 2020
Published by Mehtab Zafar at November 13, 2020
Categories
This year I got selected for Google Summer of Code 2020 under The Honeynet Project and worked on the SNARE/TANNER. GSoC 2020 was very special for […]
September 29, 2020
Published by Irini Lygerou at September 29, 2020
Categories
HosTaGe: a mobile honeypot Why I choose this project I am passionate about Network Security, Cybersecurity, and programming, and I wanted to get involved with a […]
August 27, 2020
Published by Abhinav Saxena at August 27, 2020
Categories
Shreya Malviya wrote this post as a project summary of her GSoC2020 experience. Team: Mentors: Shay Nehmad, Daniel GoldbergStudent: Shreya Malviya Introduction What is Infection Monkey? […]
August 26, 2020
Published by Eshaan Bansal at August 26, 2020
Categories
Student: Eshaan Bansal (@Eshaan7)Mentor: Matteo Lodi and Pietro DelsanteOrganization: The Honeynet ProjectProject: Intel OwlTag: Information Security Project Overview Intel Owl Intel Owl is an Open Source […]
July 23, 2020
Published by Maximilian Hils at July 23, 2020
Categories
We are excited to announce the release of mitmproxy 5.2, a free and open source interactive HTTPS proxy! As the first part of his Google Summer of Code (GSoC) at the Honeynet Project, our student Martin Plattner (@MartinPlattnr) has completely revamped mitmproxy's replacement feature, which is a powerful tool to modify and redirect HTTP messages.
July 5, 2020
Published by Eshaan Bansal at July 5, 2020
Categories
Intel Owl is an Open Source Intelligence, or OSINT solution to get threat intelligence data about a specific file, an IP or a domain from a […]
October 9, 2019
Published by The Honeynet Project at October 9, 2019
The Honeynet Project recently appointed a new Chief Research Officer, Tamas Lengyel. We want to thank again Lukas Rist for leading and growing our research over the past years, and […]
- Filter by
- Categories
- Tags
- Authors
- All
- Analysis
- Android
- Chapters
- Data-Mining
- Encryption
- Forensic Challenges
- Google Summer of Code
- Honeypot
- Know Your Enemy
- News
- Uncategorized
- Workshop
- All
- 2010
- 2018
- 6guard
- active defense
- Active Response Continuum
- activities
- afterglow
- afterglow cloud
- aggressive network defense
- ajgamma.liveblog.com
- AliIkinci
- Analysis
- android
- annual
- annual status report
- anti-debugging
- APIMonitor
- APK
- APKinspector android malware static analysis
- ARE
- arp spoof
- Art
- ASLR
- assembly
- attack
- Attack Graph
- Attribution
- axis
- beginner
- Beta
- Bifrozt
- blogging
- botnet
- botnet monitoring
- botnet protocols
- Botnets
- browsers under attack
- c++
- canberra
- capture-hpc
- capture-hpc honeyclient honeyspider
- carberp
- CEO
- CFG
- challenge
- challenge 2
- chapter
- Citadel
- civil process
- client
- clustering
- code of conduct
- Computer Fraud and Abuse Act
- conference
- conficker
- conpot
- control flow
- counter-attack
- criminal process
- cro
- Crowdstrike
- cuckoo
- cuckoo sandbox androguard gsoc
- cuckoo sandbox malware analysis
- d3.v2
- Dalvik
- Damballa
- data
- data link layer attacks
- data mining
- Data model Honeyweb tutorial
- data visualization
- dbscan
- DDoS
- DDOS Honeypot
- debian
- decompilation
- demo
- DEP
- dependencies
- detect
- detection
- dhcp starvation
- dionaea
- Django
- Docker
- Dorothy
- downadup
- dpkt
- droidbot
- droidbox
- dubai
- dubai2013
- Dynamic
- dynamic analysis
- dynamic malware analysis virtuaization cuckoo gsoc
- EAT filtering
- emet
- Emulation
- encrypted traffic
- encryption
- ethics
- exploit
- exploit replay
- explot
- FC10
- feature
- Feature 1
- flash
- flow
- focus
- Forensic Challenge
- Forensic Challenge 2010
- forensic challenges
- forensics
- format
- framework
- framework honeypot
- frontend
- ftp
- Fuzzy hashing
- GeoDjango
- georg
- Ghost
- glaspot
- glastopf
- GlastopNG
- globalpot
- google summer of code
- Graphviz
- greedybear
- gsoc
- gsoc 2012
- GSoC 2013
- gsoc glutton
- gsoc google
- gsoc gsoc2010
- gsoc gsoc2011
- gsoc snare tanner
- GSoC11
- GSOC2011
- gsoc2011 gsoc
- gsoc2012
- gsoc2013
- gsoc2014
- gsoc2015
- gsoc2016
- gsoc2017
- gsoc2018
- gsoc2020
- GUI
- hack back
- Hackback
- Hacking Back
- Heralding
- HeX
- high interaction honeypot
- hnw2015
- HNW2016
- honeybrid gsoc introduction
- honeybrid gsoc parser
- honeybrid gsoc redirection
- honeybrid gsoc testing
- honeyclient
- honeydrive
- honeymap
- honeyned
- honeynet
- Honeynet Blogs
- honeypot
- honeypots
- honeysink
- honeywall
- honeyweb
- Hong Kong
- Hook
- hpfeeds
- HPSoC
- hpw2012 workshop norman
- HPW2015
- http https proxy gsoc honeyproxy forensics
- hugo gonzalez
- humanitarian law
- ICS
- images
- Imalse
- improper ruse
- infection monkey
- integrity
- intelowl
- interesting
- ipv6
- IRB
- Iteolih
- Iteolih Samba DCERPC Python
- Iteolih Samba DCERPC Python libemu
- Kelihos
- Kelihos.B/Hlux.B
- kippo
- kippo SSH honeypot
- kmeans
- KYE
- KYT
- Law
- law of war
- Layer 2
- layout
- legal
- lessons learned
- libemu
- link-local
- linux
- log record
- logging
- logs
- low-interaction
- Lukas Rist
- MAC flood
- machine learning
- mahmud
- Main blog
- Malaysian Honeynet chapter
- malicious
- malware
- Malware
- malware sandbox cuckoo
- Mariposa
- Meet our new CEO Andre
- Mexican Chapter Annual Report
- Microsoft
- mitmproxy
- Mobile
- mobile HosTage
- mohpt
- Monday
- monthly
- murofet
- nebula
- network
- network traffic
- New Honeynet Project Challenge (#7): Forensic Analysis of a Compromised Server
- new version
- news
- Norway
- oxff
- paper
- parallel coordinates
- parser
- peepdf
- phoneyc
- phoneyc paper leet09 honeyclient
- picviz
- project
- project news
- protocol
- protocols
- publication
- python
- qebek
- qebek sebek qemu windows
- qebek windows
- qebek windows socket network
- qemu
- qemu hook
- qemu qebek
- question
- re-google
- readables
- reading
- release
- replay
- replica bags
- report
- reports
- research
- reverse engineering
- reversing
- ROP
- rumal
- Sambacry
- San Antonio
- sandbox
- sandbox evasion
- SCADA
- scan
- scanner
- sebek
- sebek visualization
- security
- shellcode
- shockpot
- signature
- Simpilified Chinese
- Simplified Chinese
- Simulation
- sink
- sinkhole
- smartphone
- snare
- snort
- social honeypots
- social networks
- spam
- spamscope
- spanish chapter
- speak
- spidermonkey
- splunk
- statistic
- statistics
- status
- Stavanger
- stix
- Storm Worm
- Stormfucker
- STP manipulation
- student
- Symantec
- taiwan
- takedown
- talk
- Tallinn Manual
- tanner
- taxii
- The Italian Honeynet Chapter
- the Menlo Report
- threatintel
- thug
- thug-vagrant
- tool
- tpot
- traceexploit
- Traditional Chinese
- traffic analyze
- translation
- trojan
- twman
- UI framework
- UK Chapter
- update
- vagrant
- Video
- visualization
- vlan hopping
- vulnerabilities
- Waledac
- Wannacry
- web honeypot
- web server botnet
- webhoneypot
- webservice
- White Paper
- windows
- wireshark
- wireshnork
- wordpot
- workshop
- workshop 2012 facebook
- workshop facebook
- worldmap
- zeus
- zoom
- 繁體中文
- 鑑識分析挑戰
- 香港
August 20, 2021
Published by Matteo Lodi at August 20, 2021
Categories
Student: Shubham Pandey (@sp35) Mentor: Eshaan Bansal and Matteo Lodi Organization: The Honeynet Project Project: Intel Owl Tag: Information Security Project Overview Intel Owl is an […]
November 13, 2020
Published by Mehtab Zafar at November 13, 2020
Categories
This year I got selected for Google Summer of Code 2020 under The Honeynet Project and worked on the SNARE/TANNER. GSoC 2020 was very special for […]
September 29, 2020
Published by Irini Lygerou at September 29, 2020
Categories
HosTaGe: a mobile honeypot Why I choose this project I am passionate about Network Security, Cybersecurity, and programming, and I wanted to get involved with a […]
August 27, 2020
Published by Abhinav Saxena at August 27, 2020
Categories
Shreya Malviya wrote this post as a project summary of her GSoC2020 experience. Team: Mentors: Shay Nehmad, Daniel GoldbergStudent: Shreya Malviya Introduction What is Infection Monkey? […]
August 26, 2020
Published by Eshaan Bansal at August 26, 2020
Categories
Student: Eshaan Bansal (@Eshaan7)Mentor: Matteo Lodi and Pietro DelsanteOrganization: The Honeynet ProjectProject: Intel OwlTag: Information Security Project Overview Intel Owl Intel Owl is an Open Source […]
July 23, 2020
Published by Maximilian Hils at July 23, 2020
Categories
We are excited to announce the release of mitmproxy 5.2, a free and open source interactive HTTPS proxy! As the first part of his Google Summer of Code (GSoC) at the Honeynet Project, our student Martin Plattner (@MartinPlattnr) has completely revamped mitmproxy's replacement feature, which is a powerful tool to modify and redirect HTTP messages.
July 5, 2020
Published by Eshaan Bansal at July 5, 2020
Categories
Intel Owl is an Open Source Intelligence, or OSINT solution to get threat intelligence data about a specific file, an IP or a domain from a […]
October 9, 2019
Published by The Honeynet Project at October 9, 2019
The Honeynet Project recently appointed a new Chief Research Officer, Tamas Lengyel. We want to thank again Lukas Rist for leading and growing our research over the past years, and […]
- Filter by
- Categories
- Tags
- Authors
- All
- Analysis
- Android
- Chapters
- Data-Mining
- Encryption
- Forensic Challenges
- Google Summer of Code
- Honeypot
- Know Your Enemy
- News
- Uncategorized
- Workshop
- All
- 2010
- 2018
- 6guard
- active defense
- Active Response Continuum
- activities
- afterglow
- afterglow cloud
- aggressive network defense
- ajgamma.liveblog.com
- AliIkinci
- Analysis
- android
- annual
- annual status report
- anti-debugging
- APIMonitor
- APK
- APKinspector android malware static analysis
- ARE
- arp spoof
- Art
- ASLR
- assembly
- attack
- Attack Graph
- Attribution
- axis
- beginner
- Beta
- Bifrozt
- blogging
- botnet
- botnet monitoring
- botnet protocols
- Botnets
- browsers under attack
- c++
- canberra
- capture-hpc
- capture-hpc honeyclient honeyspider
- carberp
- CEO
- CFG
- challenge
- challenge 2
- chapter
- Citadel
- civil process
- client
- clustering
- code of conduct
- Computer Fraud and Abuse Act
- conference
- conficker
- conpot
- control flow
- counter-attack
- criminal process
- cro
- Crowdstrike
- cuckoo
- cuckoo sandbox androguard gsoc
- cuckoo sandbox malware analysis
- d3.v2
- Dalvik
- Damballa
- data
- data link layer attacks
- data mining
- Data model Honeyweb tutorial
- data visualization
- dbscan
- DDoS
- DDOS Honeypot
- debian
- decompilation
- demo
- DEP
- dependencies
- detect
- detection
- dhcp starvation
- dionaea
- Django
- Docker
- Dorothy
- downadup
- dpkt
- droidbot
- droidbox
- dubai
- dubai2013
- Dynamic
- dynamic analysis
- dynamic malware analysis virtuaization cuckoo gsoc
- EAT filtering
- emet
- Emulation
- encrypted traffic
- encryption
- ethics
- exploit
- exploit replay
- explot
- FC10
- feature
- Feature 1
- flash
- flow
- focus
- Forensic Challenge
- Forensic Challenge 2010
- forensic challenges
- forensics
- format
- framework
- framework honeypot
- frontend
- ftp
- Fuzzy hashing
- GeoDjango
- georg
- Ghost
- glaspot
- glastopf
- GlastopNG
- globalpot
- google summer of code
- Graphviz
- greedybear
- gsoc
- gsoc 2012
- GSoC 2013
- gsoc glutton
- gsoc google
- gsoc gsoc2010
- gsoc gsoc2011
- gsoc snare tanner
- GSoC11
- GSOC2011
- gsoc2011 gsoc
- gsoc2012
- gsoc2013
- gsoc2014
- gsoc2015
- gsoc2016
- gsoc2017
- gsoc2018
- gsoc2020
- GUI
- hack back
- Hackback
- Hacking Back
- Heralding
- HeX
- high interaction honeypot
- hnw2015
- HNW2016
- honeybrid gsoc introduction
- honeybrid gsoc parser
- honeybrid gsoc redirection
- honeybrid gsoc testing
- honeyclient
- honeydrive
- honeymap
- honeyned
- honeynet
- Honeynet Blogs
- honeypot
- honeypots
- honeysink
- honeywall
- honeyweb
- Hong Kong
- Hook
- hpfeeds
- HPSoC
- hpw2012 workshop norman
- HPW2015
- http https proxy gsoc honeyproxy forensics
- hugo gonzalez
- humanitarian law
- ICS
- images
- Imalse
- improper ruse
- infection monkey
- integrity
- intelowl
- interesting
- ipv6
- IRB
- Iteolih
- Iteolih Samba DCERPC Python
- Iteolih Samba DCERPC Python libemu
- Kelihos
- Kelihos.B/Hlux.B
- kippo
- kippo SSH honeypot
- kmeans
- KYE
- KYT
- Law
- law of war
- Layer 2
- layout
- legal
- lessons learned
- libemu
- link-local
- linux
- log record
- logging
- logs
- low-interaction
- Lukas Rist
- MAC flood
- machine learning
- mahmud
- Main blog
- Malaysian Honeynet chapter
- malicious
- malware
- Malware
- malware sandbox cuckoo
- Mariposa
- Meet our new CEO Andre
- Mexican Chapter Annual Report
- Microsoft
- mitmproxy
- Mobile
- mobile HosTage
- mohpt
- Monday
- monthly
- murofet
- nebula
- network
- network traffic
- New Honeynet Project Challenge (#7): Forensic Analysis of a Compromised Server
- new version
- news
- Norway
- oxff
- paper
- parallel coordinates
- parser
- peepdf
- phoneyc
- phoneyc paper leet09 honeyclient
- picviz
- project
- project news
- protocol
- protocols
- publication
- python
- qebek
- qebek sebek qemu windows
- qebek windows
- qebek windows socket network
- qemu
- qemu hook
- qemu qebek
- question
- re-google
- readables
- reading
- release
- replay
- replica bags
- report
- reports
- research
- reverse engineering
- reversing
- ROP
- rumal
- Sambacry
- San Antonio
- sandbox
- sandbox evasion
- SCADA
- scan
- scanner
- sebek
- sebek visualization
- security
- shellcode
- shockpot
- signature
- Simpilified Chinese
- Simplified Chinese
- Simulation
- sink
- sinkhole
- smartphone
- snare
- snort
- social honeypots
- social networks
- spam
- spamscope
- spanish chapter
- speak
- spidermonkey
- splunk
- statistic
- statistics
- status
- Stavanger
- stix
- Storm Worm
- Stormfucker
- STP manipulation
- student
- Symantec
- taiwan
- takedown
- talk
- Tallinn Manual
- tanner
- taxii
- The Italian Honeynet Chapter
- the Menlo Report
- threatintel
- thug
- thug-vagrant
- tool
- tpot
- traceexploit
- Traditional Chinese
- traffic analyze
- translation
- trojan
- twman
- UI framework
- UK Chapter
- update
- vagrant
- Video
- visualization
- vlan hopping
- vulnerabilities
- Waledac
- Wannacry
- web honeypot
- web server botnet
- webhoneypot
- webservice
- White Paper
- windows
- wireshark
- wireshnork
- wordpot
- workshop
- workshop 2012 facebook
- workshop facebook
- worldmap
- zeus
- zoom
- 繁體中文
- 鑑識分析挑戰
- 香港
August 20, 2021
Published by Matteo Lodi at August 20, 2021
Categories
Student: Shubham Pandey (@sp35) Mentor: Eshaan Bansal and Matteo Lodi Organization: The Honeynet Project Project: Intel Owl Tag: Information Security Project Overview Intel Owl is an […]
November 13, 2020
Published by Mehtab Zafar at November 13, 2020
Categories
This year I got selected for Google Summer of Code 2020 under The Honeynet Project and worked on the SNARE/TANNER. GSoC 2020 was very special for […]
September 29, 2020
Published by Irini Lygerou at September 29, 2020
Categories
HosTaGe: a mobile honeypot Why I choose this project I am passionate about Network Security, Cybersecurity, and programming, and I wanted to get involved with a […]
August 27, 2020
Published by Abhinav Saxena at August 27, 2020
Categories
Shreya Malviya wrote this post as a project summary of her GSoC2020 experience. Team: Mentors: Shay Nehmad, Daniel GoldbergStudent: Shreya Malviya Introduction What is Infection Monkey? […]
August 26, 2020
Published by Eshaan Bansal at August 26, 2020
Categories
Student: Eshaan Bansal (@Eshaan7)Mentor: Matteo Lodi and Pietro DelsanteOrganization: The Honeynet ProjectProject: Intel OwlTag: Information Security Project Overview Intel Owl Intel Owl is an Open Source […]
July 23, 2020
Published by Maximilian Hils at July 23, 2020
Categories
We are excited to announce the release of mitmproxy 5.2, a free and open source interactive HTTPS proxy! As the first part of his Google Summer of Code (GSoC) at the Honeynet Project, our student Martin Plattner (@MartinPlattnr) has completely revamped mitmproxy's replacement feature, which is a powerful tool to modify and redirect HTTP messages.
July 5, 2020
Published by Eshaan Bansal at July 5, 2020
Categories
Intel Owl is an Open Source Intelligence, or OSINT solution to get threat intelligence data about a specific file, an IP or a domain from a […]
October 9, 2019
Published by The Honeynet Project at October 9, 2019
The Honeynet Project recently appointed a new Chief Research Officer, Tamas Lengyel. We want to thank again Lukas Rist for leading and growing our research over the past years, and […]