RCN shadow archive

HIGH-INTERACTION SECURITY LAB

WELCOME TO RCN

Honeypots in Go. Social engineering research. Web crawlers. Domain mistypos. Shadow projects built for learning, detection, and controlled experimentation.

RCN mascot artwork
STATUS LIVE
STACK HTML / CSS / JS / GO
FOCUS DECEPTION / RESEARCH
rcn@shadow:~

> Loading archive...

> Initializing red grid...

> Mounting project index...

> Access level: observer

PROJECT INDEX

Builds from the RCN archive

01 // DECEPTION

High-Interaction Honeypots

Go-based systems built to observe behavior, collect indicators, and study attacker workflows.

Open thread
02 // INTEL

Web Crawlers

Focused crawlers for discovery, indexing, and monitoring of hostile or deceptive infrastructure.

Open thread
03 // RESEARCH

Domain MisTypos

Analysis of lookalike domains, typo abuse, and infrastructure patterns around deceptive naming.

Open thread

FIELD NOTES

Research lanes

A1

Social Engineering

Controlled writeups on persuasion chains, pretexting patterns, and behavioral weak points.

B2

Detection Ideas

Trap logic, signal collection, automation hooks, and reporting concepts for defensive learning.

C3

Infrastructure Mapping

Pattern analysis around suspicious domains, crawled assets, and environmental fingerprints.

OPERATOR

About RCN

RCN is a dark-themed archive for hands-on cybersecurity experiments, deception infrastructure, research notes, and custom-built tools. The aesthetic is cinematic and hostile by design: ominous, mechanical, red-lit, and intentionally sharp.