cesarghali / OS-FingerprintingLinks
Operating system remote fingerprinting attack and detection tools
☆55Updated 11 years ago
Alternatives and similar repositories for OS-Fingerprinting
Users that are interested in OS-Fingerprinting are comparing it to the libraries listed below
Sorting:
- ☆37Updated 10 years ago
- Signature-free approach library to detect injection and commanding attacks☆95Updated 3 years ago
- Golang based web service to scan files with yara rules☆26Updated 8 years ago
- A proof of concept of JA3 tracking.☆28Updated 6 years ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- Simple SSH brute-forcer written in Go☆21Updated 9 years ago
- OpenFlow Honeypot☆24Updated 12 years ago
- A dsniff project using bro☆10Updated 9 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Updated 8 years ago
- JA3 TLS Fingerprint database☆79Updated 5 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- ☆42Updated 3 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Updated 10 years ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.☆95Updated 3 years ago
- A wireshark/tshark plugin for the JA3 TLS Client Fingerprinting Algorithm☆59Updated last year
- Snort rules☆35Updated 6 years ago
- Vulners signature-base software version detection rules☆37Updated 3 years ago
- ☆55Updated last year
- Ender of Fast-Flux malicious domains.☆27Updated 10 years ago
- ☆11Updated 8 years ago
- Malice AntiVirus Plugins☆116Updated 6 years ago
- ☆17Updated 8 months ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 8 years ago
- ☆32Updated 8 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- CIDR to IP List Tool☆14Updated 9 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Updated last year
- LFI scan, exploit tool☆13Updated 10 years ago
- Backdoor with Golang (Cross-Plateform)☆17Updated 3 years ago
- Honeypot that emulates several protocols (incl. SSH, telnet, SMTP, HTTP, SSL and SIP)☆52Updated 9 years ago