bmiguel-teixeira / tls-tracing-with-ebpfLinks
TLS Tracing examples using eBPF against the OpenSSL Library
☆14Updated 3 years ago
Alternatives and similar repositories for tls-tracing-with-ebpf
Users that are interested in tls-tracing-with-ebpf are comparing it to the libraries listed below
Sorting:
- Architecture - design and implementation of the D4 project architecture☆16Updated 3 months ago
- Process behaviour anomaly detection using eBPF and unsupervised-learning Autoencoders☆133Updated 3 years ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆16Updated last year
- ☆30Updated 7 years ago
- Firepit - STIX Columnar Storage☆16Updated last year
- CERTITUDE - A python package to classify malicious URLs☆20Updated 3 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Updated 2 years ago
- egrets monitors egress☆46Updated 5 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆18Updated last month
- Napkin is a simple tool to produce statistical analysis of a text☆12Updated last year
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆14Updated this week
- Data orchestration and management.☆11Updated 2 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆18Updated 7 years ago
- ☆11Updated last month
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Updated 3 weeks ago
- Hosted analyzers built for Grapl☆14Updated 2 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- Automated Security Risk Identification Using AutomationML-based Engineering Data☆29Updated 3 years ago
- E4's C2 server☆20Updated 5 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- GO sandbox to run untrusted code☆42Updated 5 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆25Updated 2 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 8 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated last year
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Updated last year
- Automate the regular transfer of AIS data into a MISP Server☆10Updated last year
- A Python implementation of our efficient Bloom filter library.☆29Updated 5 years ago