CERT-Polska / hfingerLinks
Hfinger - fingerprinting HTTP requests
☆138Updated 2 years ago
Alternatives and similar repositories for hfinger
Users that are interested in hfinger are comparing it to the libraries listed below
Sorting:
- pyJARM is a library for doing JARM fingerprinting using python☆50Updated 3 months ago
- A Go implementation of JARM☆118Updated 3 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆141Updated 2 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 4 months ago
- simple YARA-based IOC scanner☆169Updated 4 months ago
- Website crawler with YARA detection☆88Updated last year
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated 2 weeks ago
- Malware Sinkhole List in various formats☆103Updated 2 years ago
- Repository of yara rules☆46Updated 9 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆154Updated 3 months ago
- A YARA Rule Performance Measurement Tool☆59Updated last year
- Static Token And Credential Scanner☆96Updated 2 years ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.☆129Updated this week
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆104Updated last month
- Personal compilation of APT malware from whitepaper releases, documents and own research☆260Updated 6 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- SNIcat☆126Updated 3 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆160Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Automatically create YARA rules from malicious documents.☆211Updated 3 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆94Updated 6 years ago
- ☆221Updated last year
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- ☆43Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- A malware analysis and classification tool.☆190Updated 3 years ago
- 🧠 🦠 An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.☆178Updated 6 years ago