rdppot Logo

rdppot

0
Free
Updated 11 March 2025
Visit Website

Listens on port 3389, on a new connection it'll create a session & assign a virtual machine from a pool to that session. After 300 seconds (default) of the session being opened or 30 seconds (default) of no activity, the connection will be closed, and the session will be terminated. It stores a copy of the disk & a full pcap, runs Suricata against the pcap, and saves the output with the disk image and the pcap. Requirements: qemu, libvirt, Python3.7, Suricata, tcpdump. Suricata installation steps included.

FEATURES

SIMILAR TOOLS

A low Interaction Client honeypot designed to detect malicious websites through signature, anomaly and pattern matching techniques.

Repository of plugins for the Honeycomb honeypot framework

SMTP honeypot tool with configurable response messages, email storage, and automatic information extraction.

Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.

Hived is a honeypot tool for deceiving attackers and gathering information.

A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.

A directory traversal fuzzer for finding and exploiting directory traversal vulnerabilities.

A DNS server for executing DNS Rebinding attacks

Endlessh is an SSH tarpit that traps SSH clients by sending an endless, random SSH banner.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved