Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.
| Date | Type | Conference | Title | Speaker(s) | Tags |
|---|---|---|---|---|---|
| 2022-12-07 | Tool demo | Blackhat |
h0neytr4p - How to catch the external threat actors with an easy to configure Honeypot.
| Subhash Popuri | honeypot |
| 2020-12-09 | Tool demo | Blackhat |
HosTaGe: mobile honeypots for rapid deployment
| Shreyas Srinivasa | honeypotblueteam |
| 2019-05-21 | Talk | Phdays |
Active defense using Honeypots v2
| Rahul Binjve | blueteamhoneypot |
| 2017-08-18 | Talk | C0c0n | 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work | Rahul Binjve | honeypotblueteam |
| 2013-03-01 | Talk | Nullcon |
BYOD: How will it shape your wireless network security in future?
| Kiran Deshpande | wifimobiledos+3 |
| 2009-08-02 | Talk | Defcon |
Wi-Fish Finder: Who Will Bite the Bait
| Md Sohail Ahmad, Prabhash Dhyani | wifihoneypotphishing+1 |