PaloAltoNetworks / pyjarm
pyJARM is a library for doing JARM fingerprinting using python
☆51Updated 2 weeks ago
Alternatives and similar repositories for pyjarm:
Users that are interested in pyjarm are comparing it to the libraries listed below
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆140Updated last year
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- Website crawler with YARA detection☆88Updated last year
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆39Updated 5 months ago
- ☆41Updated 2 years ago
- Active C2 IoCs☆97Updated 2 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- ☆24Updated 2 years ago
- ☆44Updated last year
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆41Updated 3 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- Hfinger - fingerprinting HTTP requests☆136Updated last year
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆38Updated 2 years ago
- Tool to read EVTX files including SYSMON and convert to JSON, MISP Objects and Graph stream☆11Updated 4 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆125Updated 2 years ago
- Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules☆50Updated last year
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated 11 months ago
- An extension of the sigma standard to include security metrics.☆15Updated last year
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Updated 3 years ago
- Python based CLI for MalwareBazaar☆36Updated 2 months ago
- A MITRE Caldera plugin☆40Updated 2 months ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆57Updated last year
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆39Updated 2 years ago