Articles
- Cuckoo Sandbox 0.5 is out!
- Donate to the Honeynet Project
- ENISA publishes report on honeypots
- Press Release: 2013 Honeynet Project Workshop
- Know Your Enemy: Social Dynamics of Hacking
- The Winner of the Norman Malware Analyzer G2 raffle is ...
- Ethics in Computer Security Research: Kelihos.B/Hlux.B botnet takedown
- Kelihos.B/Hlux.B botnet takedown
- Google Soc 2012 - Honeynet Project Accepted
- Release of WoLF Viz
- Last chance for early bird registration
- 2012 Honeynet Project Security Workshop @ Facebook, Inc. - SF Bay Area, CA, USA - March 19th/20th 2012
- Android Reverse Engineering (A.R.E.) Virtual Machine available for download now!
- Google Summer of Code 2011- Wrap up
- Google SoC 2011 - Accepted Projects Announced
- Forensic Challange 7 - Only 5 days left!
- First-Ever Public Honeynet Project Security Workshop - Slides Online
- Forensic Challenge 2010/5 - Log Mysteries - What Apache version was used?
- New version of honeypot monitoring tool Qebek available
- Forensic Challenge 2010/6 - Analyzing Malicious Portable Destructive Files - The winners are ...
- Announcing the publication of Know Your Tools: Glastopf - A dynamic, low-interaction web application honeypot
- Announcing the publication of Know Your Tools: Qebek - Conceal the Monitoring
- Forensic Challenge 2010/5 - Log Mysteries - just a few days left to submit your solution
- The winners of the 4th Forensic Challenge 2010 VoIP are ...
- Forensic Challenge 2010/4 - VoIP - 4 days left!
- How can we improve the Forensic Challenge?
- Forensic Challenge 2010/3 - "Banking Troubles" - submission deadline extended to Monday, 26th of April 2010
- Forensic Challenge 2010/3 - "Banking Troubles" has been posted
- Forensic Challenge 2010/2 - "browsers under attack" - update
- Forensic Challenge 2010/2 - "browsers under attack" - submission deadline extended to Monday, 8th of March 2010
- Forensic Challenge 2010 - Challenge 1 update
- First challenge of the Forensic Challenge 2010 has been posted.
- Announcing the Honeynet Project Forensic Challenge 2010
- Know Your Tools: use Picviz to find attacks