A Go implementation of JARM
☆119Jun 14, 2022Updated 3 years ago
Alternatives and similar repositories for jarm-go
Users that are interested in jarm-go are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆1,288Jul 13, 2023Updated 2 years ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆119Jan 15, 2026Updated 2 months ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Open source tools, libraries, and datasets related to the runZero product and associated research☆125Jan 22, 2026Updated 2 months ago
- excrypto offers specialized versions of the Go crypto, TLS, x509, and SSH packages designed for security research.☆15Mar 16, 2026Updated last week
- Go library for connecting to CertStream☆156Oct 26, 2022Updated 3 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Apr 20, 2023Updated 2 years ago
- The Data Analysis Pipeline☆17Apr 23, 2019Updated 6 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 9 months ago
- Do bulk whois lookups and get alerted on domains of interest.☆43Aug 5, 2024Updated last year
- This tool was open sourced as part of JARM Randomizer: Evading JARM Fingerprinting for HiTB Amsterdam 2021.☆49Jul 25, 2023Updated 2 years ago
- Wraps projectdiscovery's cdncheck library to exclude CDN hosts from input passed over stdin☆45Mar 13, 2023Updated 3 years ago
- IcedID Decryption Tool☆28May 7, 2021Updated 4 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- IP/FQDN data structure helper with randomization of hosts and ports based on masscan internal logic☆69Jul 7, 2024Updated last year
- pyJARM is a library for doing JARM fingerprinting using python☆50Mar 23, 2025Updated last year
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Dec 8, 2020Updated 5 years ago
- Go package for working with SSLLabs API☆19Mar 11, 2026Updated last week
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- ☆451Aug 4, 2021Updated 4 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- ☆21Dec 22, 2020Updated 5 years ago
- Pattern recognition for hosts, services, and content☆765Mar 16, 2026Updated last week
- Internet data processing tools☆54Jan 1, 2021Updated 5 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- CIDR to IP List Tool☆14Mar 12, 2016Updated 10 years ago
- PE File Blessing - To continue or not to continue☆87Nov 23, 2019Updated 6 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆163Apr 19, 2020Updated 5 years ago
- A Passive SSH back-end and scanner.☆104Jun 18, 2025Updated 9 months ago
- Extracting AsyncRAT configuration using CyberChef☆14May 4, 2022Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago