CERT-Polska / hfinger
Hfinger - fingerprinting HTTP requests
☆137Updated last year
Alternatives and similar repositories for hfinger:
Users that are interested in hfinger are comparing it to the libraries listed below
- pyJARM is a library for doing JARM fingerprinting using python☆49Updated last month
- SNIcat☆126Updated 3 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆140Updated 2 years ago
- simple YARA-based IOC scanner☆169Updated 2 months ago
- Website crawler with YARA detection☆88Updated last year
- A Go implementation of JARM☆118Updated 2 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆104Updated last month
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.☆123Updated 4 months ago
- Extract indicators of compromise from text, including "escaped" ones.☆159Updated 5 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 2 months ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆153Updated last month
- Active C2 IoCs☆99Updated 2 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆70Updated 3 weeks ago
- Automatically create YARA rules from malicious documents.☆211Updated 2 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- YARI is an interactive debugger for YARA Language.☆88Updated 3 months ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 5 years ago
- Static based decoders for malware samples☆93Updated 4 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆247Updated 2 years ago
- 🧠 🦠 An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.☆178Updated 5 years ago
- Malware Sinkhole List in various formats☆103Updated 2 years ago
- A YARA Rule Performance Measurement Tool☆59Updated last year
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- RDP honeypot☆66Updated 5 years ago
- A forensic evidence acquirer☆86Updated 4 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆72Updated 10 months ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆80Updated 8 months ago