0x4D31 / finchLinks
Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act on them: block, reroute, tarpit, or deceive in real time.
☆208Updated last month
Alternatives and similar repositories for finch
Users that are interested in finch are comparing it to the libraries listed below
Sorting:
- Putting a leash on naughty AWS permissions☆130Updated last week
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆128Updated 4 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated 2 weeks ago
- Modular web-application honeypot platform built using go and gin☆60Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆48Updated 6 months ago
- JA4TScan is an active TCP server fingerprinting tool.☆88Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆40Updated last month
- Tail Certificate Transparency logs and extract hostnames☆124Updated 2 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 11 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆101Updated 3 months ago
- An index of publicly available and open-source threat detection rulesets.☆124Updated 4 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆86Updated last month
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆253Updated last week
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆177Updated 7 months ago
- Find what egress ports are allowed☆42Updated 2 years ago
- An archive of 0day.today exploits☆163Updated last month
- ☆75Updated 5 months ago
- A next-generation HTTP stealth proxy which perfectly cloaks requests as the Chrome browser across all layers of the stack.☆240Updated last week
- Protection against HTML smuggling attacks.☆97Updated 2 months ago
- Signature based honeypot detector tool written in Golang☆103Updated 5 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆133Updated last week
- Automation tool for Windows Deception Host Burn-In☆86Updated 9 months ago
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆98Updated 7 months ago
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆161Updated 3 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆56Updated 7 months ago
- ☆33Updated 5 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆87Updated last month
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 3 months ago