cesarghali / OS-FingerprintingLinks
Operating system remote fingerprinting attack and detection tools
☆54Updated 11 years ago
Alternatives and similar repositories for OS-Fingerprinting
Users that are interested in OS-Fingerprinting are comparing it to the libraries listed below
Sorting:
- JA3 TLS Fingerprint database☆79Updated 5 years ago
- A proof of concept of JA3 tracking.☆27Updated 6 years ago
- OpenFlow Honeypot☆23Updated 12 years ago
- ☆36Updated 9 years ago
- Snort rules☆35Updated 6 years ago
- Golang based web service to scan files with yara rules☆26Updated 7 years ago
- Simple SSH brute-forcer written in Go☆21Updated 9 years ago
- A wireshark/tshark plugin for the JA3 TLS Client Fingerprinting Algorithm☆59Updated last year
- ☆12Updated 7 years ago
- ☆16Updated 10 years ago
- Checkpot Honeypot Checker☆43Updated 6 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 7 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- A collection of known Domain Generation Algorithms☆66Updated 9 years ago
- The python client of passivedns.cn☆97Updated 6 years ago
- ☆16Updated 7 years ago
- Malice File Info Plugin (libmagic, exiftool, TRiD and ssdeep)☆30Updated last year
- ☆9Updated 8 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 8 years ago
- Some of the presentations given by me☆18Updated 6 months ago
- htcap is a web application scanner able to crawl single page application (SPA) in a recursive manner by intercepting ajax calls and DOM c…☆18Updated 7 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- Backdoor with Golang (Cross-Plateform)☆17Updated 3 years ago
- Suspicious DGA from PDNS and Sandbox.☆185Updated 2 years ago
- ☆10Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Python library to extract potential IOCs from a pcap file☆10Updated 6 years ago
- ssdeep cluster analysis for malware files☆30Updated 5 years ago
- Ender of Fast-Flux malicious domains.☆27Updated 10 years ago
- Application and service identification rules for Suricata☆29Updated 2 years ago