The true secret of happiness lies in taking a genuine interest in all the details of daily life.
– Yue Xuan Blog
Practical Guide: Building an Automated Threat Intelligence Feed with HFish + Python + GitHub Pages
HFish API Configuration Documentation Open-Source Threat Intelligence Example: ip_list honeypot-blocklist Project Repository Planning The most essential characteristic of a honeypot is this: no legitimate business traffic should ever access it. Therefore, any data entering a honeypot is essentially “suspicious” or “malicious” by nature. This gives honeypot-collected data an extremely high signal-to-noise ratio (high fidelity). A honeypot can capture basic attacker information and convert it into Indicators of Compromise (IOCs): ...