Join us for the Honeynet Workshop 2024: May 27th–29th, Copenhagen, Denmark

Google Summer of Code 2024 Announcement

25 Feb 2024 Lukas Rist gsoc

We are happy to announce that we have been selected as an organization to participate in Google Summer of Code 2024! This will be the 15th time that Honeynet is participating in the Google Summer of Code program to accelerate the creation of information- and cyber security related tools that are free and open source software. We are now entering the community bonding phase during which students are encouraged to reach out and interact with organizations and start getting involved with potential projects. We strongly recommend to join our Discord.

GSoC 2023 Project summary: Frontend Improvements for Buffalogs, IntelOwl

27 Aug 2023 Matteo Lodi gsoc intelowl buffalogs
Our dedicated Google Summer of Code (GSoC) participant, Abheek, has spent an impressive three-month duration program actively contributing to not one, but two distinct projects: IntelOwl and Buffalogs. Notably, Abheek undertook the responsibility of crafting the brand-new official website for IntelOwl throughout this period. In light of this significant achievement, we believe it is only fitting to showcase his remarkable results and contributions within the official IntelOwl site, in which he discuses his journey as a designer/frontend developer, the tasks involved and the detailed contributions to both projects, including the revamping of IntelOwl’s website, implementing JWT authentication for Buffalogs, creating maps and graphs for BuffaLogs’ dashboard, and crafting a frontend guide for IntelOwl using react-joyride.

GSoC 2022 Project summary: Creating Playbooks for IntelOwl

06 Oct 2022 Matteo Lodi gsoc intelowl threatintel

Our GSoC student Aditya Narayan Sinha was working for three months under the supervision of Matteo Lodi on the OSINT platform IntelOwl, specifically on introducing playbooks that define automated actions associated with the observation of a specific indicator of compromise.

Read on for an overview of their achievements and how they successfully contributed towards IntelOwl and some considerations for the future.

GSoC 2022 Project Summary: IntelOwl Go Client (go-intelowl)

06 Sep 2022 Matteo Lodi gsoc intelowl threatintel

Our GSoC student Hussain Khan was working for three months under the supervision of Matteo Lodi on the OSINT platform IntelOwl, specifically on a Go client library, allowing developers to integrate with the IntelOwl API in their solutions.

Read on for an overview of their achievements and how they successfully contributed towards IntelOwl and some considerations for the future.

GSoC 2021 Project Summary: IntelOwl Connectors Manager and Integrations

20 Aug 2021 Matteo Lodi gsoc intelowl threatintel

Our GSoC student Shubham Pandey was working for three months under the supervision of Matteo Lodi on the OSINT platform IntelOwl, specifically introducing the connector manager allowing for powerful integrations with external data sources.

Read on for an overview of their achievements and how they successfully contributed towards IntelOwl and some considerations for the future.

GSoC 2021 Project Summary: IntelOwl Improvements

20 Aug 2021 Matteo Lodi gsoc intelowl threatintel

Our GSoC student Sarthak Khattar was working for three months under the supervision of Matteo Lodi on the OSINT platform IntelOwl, specifically overhauling the analyzer configuration, API and test suite refactoring, and the integration of new analyzers.

Read on for an overview of their achievements and how they successfully contributed towards IntelOwl and some considerations for the future.

GSOC 2020 PROJECT SUMMARY: INFECTION MONKEY

27 Aug 2020 Abhinav Saxena gsoc gsoc2020 infection-monkey
Shreya Malviya wrote this post as a project summary of her GSoC2020 experience. Team: Mentors: Shay Nehmad, Daniel Goldberg Student: Shreya Malviya Introduction What is Infection Monkey? Infection Monkey is an open-source security tool for testing a data center’s resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self-propagate across on-premises/cloud-based data centers and finds their weaknesses, whose results it then reports to a centralized Monkey Island Command and Control server.