CERT-Polska / hfingerLinks
Hfinger - fingerprinting HTTP requests
☆141Updated 2 years ago
Alternatives and similar repositories for hfinger
Users that are interested in hfinger are comparing it to the libraries listed below
Sorting:
- pyJARM is a library for doing JARM fingerprinting using python☆50Updated 10 months ago
- A Go implementation of JARM☆120Updated 3 years ago
- Website crawler with YARA detection☆90Updated 2 years ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆144Updated this week
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated 2 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆145Updated 2 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 11 months ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆162Updated 10 months ago
- simple YARA-based IOC scanner☆175Updated 2 weeks ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- SNIcat☆128Updated 4 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 11 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 4 years ago
- Active C2 IoCs☆99Updated 3 years ago
- A YARA Rule Performance Measurement Tool☆61Updated last year
- Extract indicators of compromise from text, including "escaped" ones.☆162Updated 5 years ago
- Malware Sinkhole List in various formats☆103Updated 3 years ago
- Passive Security Tools Fingerprinting Framework☆75Updated 4 years ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Updated 3 years ago
- A forensic evidence acquirer☆86Updated 4 years ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 6 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆57Updated 2 years ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆81Updated 4 months ago
- Typodetect☆74Updated 4 years ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆60Updated 2 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆84Updated last year
- Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies☆107Updated 4 years ago