Miniprint Logo

Miniprint

0
Free
Visit Website

Miniprint acts like a standard networked printer that has been accidentally exposed to the public internet. It speaks the Printer Job Language (PJL) over the raw network protocol. Features include a fully-featured virtual filesystem in which attackers can read and write files and directories - nothing gets written to the host. Any PostScript or plaintext print jobs sent to the printer will be saved to the uploads/ directory. Extensive logging is also provided. It is recommended to install the tool using virtualenv and pip3. Usage: miniprint [-b,--bind HOST] [-l,--log-file FILE] [-t,--time-out TIME] [-h] Optional arguments include -b, --bind <host> to bind the server to a specific host, -l, --log-file <file> to save logs to a specific file, and -t, --timeout <time> to set a time limit for commands before disconnecting the client. To interactively attack miniprint on localhost, you can use the command `miniprint`.

FEATURES

ALTERNATIVES

A honeypot tool with RDP and VNC feed support.

A low-interaction honeypot for detecting and analyzing security threats

A honeypot tool that simulates an open relay to capture and analyze spam

Automated script to install and deploy a honeypot with kippo, dionaea, and p0f on Ubuntu 12.04.

A Perl honeypot program for monitoring hostile traffic and wasting hackers' time.

A honeypot agent for running honeypots with service and data at threatwar.com.

A Go-based honeypot server for detecting and logging attacker activity

A comprehensive dashboard for managing and monitoring honeypots with detailed information on attack attempts and connections.

PINNED