cesarghali / OS-Fingerprinting
Operating system remote fingerprinting attack and detection tools
☆53Updated 11 years ago
Related projects ⓘ
Alternatives and complementary repositories for OS-Fingerprinting
- JA3 TLS Fingerprint database☆73Updated 4 years ago
- OpenFlow Honeypot☆23Updated 11 years ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆66Updated 6 months ago
- A proof of concept of JA3 tracking.☆28Updated 5 years ago
- Snort rules☆34Updated 5 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Updated 7 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆42Updated 7 years ago
- ☆37Updated 9 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆33Updated 7 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆42Updated 7 years ago
- ☆41Updated 2 years ago
- Quickly generate suricata rules for IOCs☆28Updated 3 years ago
- Code, commands, and chatter about Threat Hunting.☆34Updated 4 years ago
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆51Updated 9 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- reveal xored strings in mirai binary☆12Updated 6 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 4 years ago
- Freki is a tool to manipulate packets in usermode using NFQUEUE and golang.☆58Updated last year
- Malware samples observed in the wild from time to time☆12Updated 5 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 6 years ago
- Honeypot that emulates several protocols (incl. SSH, telnet, SMTP, HTTP, SSL and SIP)☆51Updated 8 years ago
- Application and service identification rules for Suricata☆29Updated 2 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆35Updated 9 years ago
- A Simple PE File Heuristics Scanners☆50Updated 5 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆66Updated 6 years ago
- ☆31Updated 8 years ago
- A dsniff project using bro☆9Updated 8 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 6 years ago
- Community-based integrated malware identification system☆82Updated last year