vnclowpot Logo

vnclowpot

0
Free
Visit Website

Low-interaction VNC honeypot that listens on a port and logs responses to a static VNC Auth challenge. It was inspired by VNC-Pot, but does not have any dependencies outside the go standard library. Setup and Install: go get github.com/magisterquis/vnclowpot go install github.com/magisterquis/vnclowpot vnclowpot Options: There are only two options: The listen address can be changed with -l. John The Ripper-compatible lines can be generated with -j (and will need to be extracted from the log messages with something like cut -f 4 -d ' '). Pull requests are welcome. Cracker: In the cracker directory, there is a simple program to try to crack the handshakes logged in John The Ripper format. See its README for more details. Tester: In the tester directory, there is a simple program to generate VNC authentication attempts, for use in testing vnclowpot, as well as being production-grade for pentesting. See its README for more details. Windows: Should probably work.

FEATURES

ALTERNATIVES

A tool for exploiting SSRF and gaining RCE in various servers

An Open-source intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue Teamers.

A honeypot system that detects and identifies attack commands, recon attempts, and download commands, mimicking a vulnerable Elasticsearch instance.

A low to medium interaction honeypot with a variety of plugins for cybersecurity monitoring.

A Go-based honeypot server for detecting and logging attacker activity

An LLM-based honeypot file system creator that generates realistic file systems and configurations to lure attackers and improve analyst engagement.

A Python web application honeypot that provides simple statistics for the Glastopf.

Docker-based honeypot setup with detailed installation and configuration instructions.