I wish everyone a good day. I also had a question about RDP: How can we use RDP as a virtual machine? In other words, how can we enter the desired malicious and similar websites, download files, software, viruses and run them in RDP? But so that it does not damage our own computer
GOOD AFTERNOON DEAR FORUM USERS! I was going to have a few questions with RDP.
1. What can be done with RDP?
2. Is it possible to enter RDP on Linux?
3. If a malicious file is downloaded using RDP, can it damage or infect the host?
4. For example, the username and password of someone's computer...
~Goldbrute RDP Bruteforcer~
GOLDBRUTE is an RDP Bruteforcing software, You can get 100+ hits per day by using the resources provided with the software.
These include:
Username List
Password List
IP List
Masscan
Detailed Guide
The Bruted RDP's can be used for the Following:
Silent Mining...