From def954c61fff1c7af20f7e82134c6b66ab449f1f Mon Sep 17 00:00:00 2001 From: sbilly Date: Sat, 4 Oct 2014 11:51:11 +0800 Subject: [PATCH] add Project Honey Pot --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index b3aa445..58f8582 100644 --- a/README.md +++ b/README.md @@ -76,6 +76,7 @@ loosing the essens in the DNS answer. * [leakedin.com](http://www.leakedin.com/) - The primary purpose of leakedin.com is to make visitors aware about the risks of loosing data. This blog just compiles samples of data lost or disclosed on sites like pastebin.com. * [FireEye OpenIOCs](https://github.com/fireeye/iocs) - FireEye Publicly Shared Indicators of Compromise (IOCs) * [OpenVAS NVT Feed](http://www.openvas.org/openvas-nvt-feed.html) - The public feed of Network Vulnerability Tests (NVTs). It contains more than 35,000 NVTs (as of April 2014), growing on a daily basis. This feed is configured as the default for OpenVAS. +* [Project Honey Pot](http://www.projecthoneypot.org/) - Project Honey Pot is the first and only distributed system for identifying spammers and the spambots they use to scrape addresses from your website. Using the Project Honey Pot system you can install addresses that are custom-tagged to the time and IP address of a visitor to your site. If one of these addresses begins receiving email we not only can tell that the messages are spam, but also the exact moment when the address was harvested and the IP address that gathered it.