cesarghali / OS-FingerprintingLinks
Operating system remote fingerprinting attack and detection tools
☆56Updated 12 years ago
Alternatives and similar repositories for OS-Fingerprinting
Users that are interested in OS-Fingerprinting are comparing it to the libraries listed below
Sorting:
- ☆37Updated 10 years ago
- Golang based web service to scan files with yara rules☆25Updated 8 years ago
- JA3 TLS Fingerprint database☆81Updated 6 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆44Updated 8 years ago
- Simple SSH brute-forcer written in Go☆21Updated 9 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Updated 8 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Updated 9 years ago
- Signature-free approach library to detect injection and commanding attacks☆97Updated 3 years ago
- A proof of concept of JA3 tracking.☆29Updated 7 years ago
- Exported from https://code.google.com/archive/p/hookme/☆43Updated 9 years ago
- ☆33Updated 9 years ago
- Collect autorun records from running system☆59Updated 3 years ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- Checkpot Honeypot Checker☆46Updated 6 years ago
- IronBee Rules☆18Updated 12 years ago
- ☆59Updated last year
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 8 years ago
- CIDR to IP List Tool☆14Updated 9 years ago
- Some of the presentations given by me☆19Updated 4 months ago
- High-interaction MitM SSH honeypot☆171Updated 7 years ago
- Community-based integrated malware identification system☆81Updated 3 years ago
- ☆11Updated 9 years ago
- Honeypot that emulates several protocols (incl. SSH, telnet, SMTP, HTTP, SSL and SIP)☆52Updated 9 years ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.☆95Updated 4 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆54Updated 11 years ago
- ☆18Updated last year
- Advanced threat detection solution for Linux.☆36Updated 5 years ago
- Code, commands, and chatter about Threat Hunting.☆35Updated 5 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago