Javierop20 / joy2ja3
Python tool for converting from joy format to JA3 format SSL/TLS hashes
☆11Updated 4 years ago
Alternatives and similar repositories for joy2ja3:
Users that are interested in joy2ja3 are comparing it to the libraries listed below
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- Zeek package to generate a SMB client fingerprint☆27Updated 4 years ago
- ☆33Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 5 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated last year
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Bro/Zeek integration with osquery☆94Updated 4 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- ☆53Updated 6 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Updated 5 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- ☆34Updated 4 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆76Updated 2 years ago
- SightingDB is a database for Sightings☆22Updated last year
- Tools to search through massive amounts of data☆21Updated 3 months ago
- FRAC and RIFT☆17Updated 5 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆80Updated 3 years ago
- Splunk App for MITRE Att&CK Navigator(TM)☆23Updated 3 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 4 years ago
- Web based Manager for Yara Rules☆57Updated 5 years ago
- Wireshark plugin to display Suricata analysis info☆93Updated 3 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆86Updated 3 years ago
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 9 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- Sigma Detection Rule Repository☆87Updated 4 years ago
- ☆12Updated 5 years ago