rdppot Logo

rdppot

0
Free
Visit Website

Listens on port 3389, on a new connection it'll create a session & assign a virtual machine from a pool to that session. After 300 seconds (default) of the session being opened or 30 seconds (default) of no activity, the connection will be closed, and the session will be terminated. It stores a copy of the disk & a full pcap, runs Suricata against the pcap, and saves the output with the disk image and the pcap. Requirements: qemu, libvirt, Python3.7, Suricata, tcpdump. Suricata installation steps included.

FEATURES

ALTERNATIVES

A tool to identify potential subdomain takeovers by checking if a CNAME record resolves to the scope address.

Helix is a versatile honeypot designed to mimic the behavior of various protocols including Kubernetes API server, HTTP, TCP, and UDP.

Tango is a set of scripts and Splunk apps for deploying honeypots with ease.

A Python web application honeypot that provides simple statistics for the Glastopf.

SHIVA: Spam Honeypot with Intelligent Virtual Analyzer for capturing and analyzing spam data.

A tool for bruteforcing subdomains of a given domain

Python telnet honeypot for catching botnet binaries

A low-interaction honeypot that logs IP addresses, usernames, and passwords used by clients connecting via SSH, primarily used for gathering intelligence on brute force attacks.

PINNED