HoneyTags: An OpenSource HoneyDocs Project

I recently started an open source project (HoneyTags) with the goal of creating special callback tags that can be embedded into files, an active defense technique popularly known as honey docs. In theory, honey docs will then callback to a main server with the time, IP address, and user-agent of the actor who opened the file. The original site that popularized the concept (https://www.honeydocs.com), within the mainstream media (or even main stream information security community for that matter), has been down for some time now, which creates an even stronger incentive for this open source project. That said, I did find another similar service during my searches, docping.me, by Roy Firestein, which allows you to upload existing .docx, .xlsx, and .ptpx, and it will embed honey doc like callbacks into these documents and then allow you to track their callbacks. Traditional honey docs mostly focused on callbacks in Microsoft Word, Microsoft Excel, HTML and PDF documents, however Microsoft has since disabled this feature by default. The main goal for my project was to create new call back modules, beyond just document callbacks, for example to put hooks into active code bases or more web-based documents, but then continuously manage those callbacks in an easy to use web interface. I encourage you to try my new project HoneyTags and contribute new callback types to be embedded into various file types that can generate http traffic.