myceliumbroker / jarmLinks
A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.
☆12Updated 4 months ago
Alternatives and similar repositories for jarm
Users that are interested in jarm are comparing it to the libraries listed below
Sorting:
- ☆34Updated this week
- Source code used at TweetFeed.live☆47Updated 2 years ago
- Threat Hunting Malware Infrastructure☆10Updated last year
- Welcome to the SEKOIA.IO Community repository!☆164Updated 3 months ago
- C2 Active Scanner☆60Updated last year
- pyJARM is a library for doing JARM fingerprinting using python☆50Updated 7 months ago
- ☆33Updated 2 weeks ago
- yara detection rules for hunting with the threathunting-keywords project☆151Updated 5 months ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆80Updated 2 weeks ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆43Updated last month
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Updated 2 years ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆107Updated this week
- ☆52Updated 2 months ago
- Active C2 IoCs☆99Updated 2 years ago
- YARA rule analyzer to improve rule quality and performance☆105Updated 6 months ago
- JA4TScan is an active TCP server fingerprinting tool.☆92Updated last year
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆140Updated last month
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Collection of rules created using YARA-Signator over Malpedia☆140Updated 11 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆37Updated 2 months ago
- ☆96Updated 5 months ago
- ☆147Updated last week
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆109Updated 5 months ago
- Packet captures of malicious traffic for analysis using Wireshark☆62Updated 2 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆36Updated last month
- Repository of Yara rules dedicated to Phishing Kits Zip files☆233Updated 2 weeks ago
- Suricata rule and intel index☆33Updated last month