pyrdp
RDP interceptor
A tool for intercepting and manipulating remote desktop protocol connections for security testing and research purposes
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
2k stars
44 watching
249 forks
Language: Python
last commit: 9 months ago
Linked from 1 awesome list
hacktoberfesthoneypotmitmpentestpyrdprdpsecurity
Related projects:
Repository | Description | Stars |
---|---|---|
| A tool for manipulating and intercepting network traffic using various techniques such as TCP/IP hijacking and ARP poison attacks. | 850 |
| An implementation of the Remote Desktop Protocol in Twisted Python | 1,694 |
| A RDP honeypot system that mimics a vulnerable RDP endpoint to detect and analyze potential attacks. | 63 |
| A toolkit for exploiting vulnerabilities in routing protocols by creating virtual routers. | 169 |
| A high-interaction honeypot solution for detecting Redis protocol exploitation | 22 |
| An extension for a Java-based proxy that intercepts HTTPS connections and enables caching while offline. | 225 |
| A tool allowing visibility into network traffic by intercepting and displaying HTTP/1, HTTP/2, and WebSocket requests and responses. | 416 |
| An MITM engine and CLI app that intercepts, records, and alters HTTP/1.1 and WebSocket traffic over plain or secure channels. | 135 |
| Reconstructs and recovers old RDP session information from broken PNG files. | 209 |
| An interactive toolkit for working with weather radar data using Python and atmospheric radar algorithms | 520 |
| Tools to exploit remote desktop sessions using NTLM and Kerberos authentication | 62 |
| A software library providing an interface to interact with a 2.9-inch e-Paper display | 9 |
| Automates the creation of Red Teaming infrastructure on cloud providers like AWS and Digital Ocean. | 615 |
| Detects known security vulnerabilities in Python dependencies and provides recommendations for remediation. | 1,758 |
| A tool to identify vulnerabilities in web applications by probing for Open Redirections and other types of attacks. | 758 |