pyrdp
awesome-honeypots
pyrdp | awesome-honeypots | |
---|---|---|
5 | 21 | |
1,433 | 8,040 | |
0.8% | - | |
8.6 | 5.9 | |
2 months ago | about 1 month ago | |
Python | Python | |
GNU General Public License v3.0 only | Artistic License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pyrdp
-
Researchers watched 100 hours of hackers hacking honeypot computers
The RDP interception tool used by the researchers: https://github.com/gosecure/pyrdp
- pyrdp: RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
-
pyrdp install problem
i need your help about special Bettercap version of Gosecure team. i have an instruction by link: https://github.com/GoSecure/pyrdp/blob/master/docs/bettercap-rdp-mitm.md
-
I need to install PyRDP
Your best option for technical support is to google the error you are receiving, or create an issue on the PyRDP repo for help: https://github.com/GoSecure/pyrdp/issues
- Release 1.1.0 ยท GoSecure/pyrdp: RDP monster-in-the-middle
awesome-honeypots
- Building a Windows Honeypots?
- Covenant C2 - unrecognized connections
- Wordlists
-
I have 10 Linux VMs that I want to run a bash script on misconfiguring OS layer options. Comment your ideas! More info in post.
you're looking for a honeypot
-
How to make honeypots.
You may be interested in https://github.com/paralax/awesome-honeypots
- What is the best open source honeypot? [Need Experiences]
- Intentionally Vulnerable Website
-
Cybersecurity 101 โ What is a Honeypot?
Also you might want to check these lists here and here for deploying some more honeypots.
-
Cybersecurity Repositories
Honeypots
-
Using honeypots data to create IOCs collection
Agreed with u/Sloky, if you want catch internal adversaries you may need a lot of tweaking. There are plenty of good lists out there such as this and this and this one
What are some alternatives?
ssh-mitm - SSH man-in-the-middle tool
tpotce - ๐ฏ T-Pot - The All In One Honeypot Platform ๐
fapro - Fake Protocol Server
Awesome-WAF - ๐ฅ Web-application firewalls (WAFs) from security standpoint.
wifipumpkin3 - Powerful framework for rogue access point attack.
DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices
cowrie - Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
hacker101 - Source code for Hacker101.com - a free online web and mobile security class.
simplification - Very fast Python line simplification using either the RDP or Visvalingam-Whyatt algorithm implemented in Rust
API-Security-Checklist - Checklist of the most important security countermeasures when designing, testing, and releasing your API
Seth - Perform a MitM attack and extract clear text credentials from RDP connections
dvws-node - Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API related vulnerabilities.