Seth
Perform a MitM attack and extract clear text credentials from RDP connections (by SySS-Research)
pyrdp
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact (by GoSecure)
Seth | pyrdp | |
---|---|---|
2 | 5 | |
1,331 | 1,434 | |
0.0% | 0.8% | |
0.0 | 8.6 | |
about 1 year ago | 2 months ago | |
Python | Python | |
MIT License | GNU General Public License v3.0 only |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Seth
Posts with mentions or reviews of Seth.
We have used some of these posts to build our list of alternatives
and similar projects.
-
RDP is susceptible to a transparent Net-NTLMv2 hash-stealing attack. When disclosed, Microsoft responded: “not a vulnerability, […] by design”.
https://github.com/SySS-Research/Seth used to work haven’t used it in years though. Same with responder though
-
Cracking RDP NLA Supplied Credentials for Threat Intelligence
I did this in 2017: https://github.com/SySS-Research/Seth
pyrdp
Posts with mentions or reviews of pyrdp.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-08-10.
-
Researchers watched 100 hours of hackers hacking honeypot computers
The RDP interception tool used by the researchers: https://github.com/gosecure/pyrdp
- pyrdp: RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
-
pyrdp install problem
i need your help about special Bettercap version of Gosecure team. i have an instruction by link: https://github.com/GoSecure/pyrdp/blob/master/docs/bettercap-rdp-mitm.md
-
I need to install PyRDP
Your best option for technical support is to google the error you are receiving, or create an issue on the PyRDP repo for help: https://github.com/GoSecure/pyrdp/issues
- Release 1.1.0 · GoSecure/pyrdp: RDP monster-in-the-middle
What are some alternatives?
When comparing Seth and pyrdp you can also consider the following projects:
wifipumpkin3 - Powerful framework for rogue access point attack.
ssh-mitm - SSH man-in-the-middle tool
elmocut - Eye candy ARP spoofer for Windows
fapro - Fake Protocol Server
RITM - Roast in the Middle
xepor - Xepor, a web routing framework for reverse engineers and security researchers, brings the best of mitmproxy & Flask
cowrie - Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
netspionage - Network Forensics CLI utility that performs Network Scanning, OSINT, and Attack Detection
simplification - Very fast Python line simplification using either the RDP or Visvalingam-Whyatt algorithm implemented in Rust
heralding - Credentials catching honeypot