Miniprint Logo

Miniprint

0
Free
Visit Website

Miniprint acts like a standard networked printer that has been accidentally exposed to the public internet. It speaks the Printer Job Language (PJL) over the raw network protocol. Features include a fully-featured virtual filesystem in which attackers can read and write files and directories - nothing gets written to the host. Any PostScript or plaintext print jobs sent to the printer will be saved to the uploads/ directory. Extensive logging is also provided. It is recommended to install the tool using virtualenv and pip3. Usage: miniprint [-b,--bind HOST] [-l,--log-file FILE] [-t,--time-out TIME] [-h] Optional arguments include -b, --bind <host> to bind the server to a specific host, -l, --log-file <file> to save logs to a specific file, and -t, --timeout <time> to set a time limit for commands before disconnecting the client. To interactively attack miniprint on localhost, you can use the command `miniprint`.

FEATURES

ALTERNATIVES

An easy to set up SSH honeypot for logging SSH connections and activity.

A tool for bruteforcing subdomains of a given domain

An open-source Python software for creating honeypots and honeynets securely.

A high-interaction honeypot solution for detecting and analyzing SMB-based attacks

A crawler-based low-interaction client honeypot for exposing website threats.

Building Honeypots for Industrial Networks using Honeyd and simulating SCADA, DCS, and PLC architectures.

HellPot is an endless honeypot that sends unruly HTTP bots to hell with grave consequences.

Apache 2 based honeypot for detecting and blocking Struts CVE 2017-5638 exploit with added support for content disposition filename parsing vulnerability.

PINNED