rdppot Logo

rdppot

0
Free
Visit Website

Listens on port 3389, on a new connection it'll create a session & assign a virtual machine from a pool to that session. After 300 seconds (default) of the session being opened or 30 seconds (default) of no activity, the connection will be closed, and the session will be terminated. It stores a copy of the disk & a full pcap, runs Suricata against the pcap, and saves the output with the disk image and the pcap. Requirements: qemu, libvirt, Python3.7, Suricata, tcpdump. Suricata installation steps included.

FEATURES

ALTERNATIVES

A project providing honeypots for embedded device vulnerabilities with support for AWS integration and JSON output.

A tool to leak git repositories from misconfigured websites

A honeypot for malware that spreads via USB storage devices, detecting infections without further information.

An easy to set up SSH honeypot for logging SSH connections and activity.

A honeypot for the SSH Service

A list of services and how to claim (sub)domains with dangling DNS records.

Low-interaction VNC honeypot for logging responses to a static VNC Auth challenge.

An Open-source intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue Teamers.