salesforce / hasshLinks
HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints can be easily stored, searched and shared in the form of a small MD5 fingerprint.
☆542Updated 3 months ago
Alternatives and similar repositories for hassh
Users that are interested in hassh are comparing it to the libraries listed below
Sorting:
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆672Updated last year
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆799Updated 5 years ago
- Code + documentation for the public GreyNoise API☆315Updated 4 years ago
- Cross-platform Yara scanner written in Go☆329Updated 2 years ago
- Python library for connecting to CertStream☆453Updated last year
- Generic Low Interaction Honeypot☆282Updated 2 months ago
- A network packet forensics tool for SSH☆253Updated 4 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆461Updated this week
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆273Updated 6 years ago
- Credentials catching honeypot☆380Updated last year
- Super Next generation Advanced Reactive honEypot☆467Updated last year
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆548Updated 2 years ago
- a network packet capture compiler☆201Updated 3 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆483Updated 2 weeks ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆123Updated 4 years ago
- DejaVU - Open Source Deception Framework☆412Updated 2 years ago
- Modular file scanning/analysis framework☆619Updated 5 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- 16,432 Free Yara rules created by☆384Updated 6 years ago
- Suricata Extreme Performance Tuning guide☆211Updated 7 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 3 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆324Updated 10 months ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- Data exfiltration over DNS request covert channel☆869Updated last year
- Machinae Security Intelligence Collector☆527Updated last year
- Passive Real-time Asset Detection System☆243Updated last year
- Pattern recognition for hosts, services, and content☆731Updated last week
- Zeek IDS Dockerfile☆101Updated 2 years ago
- p0f unofficial git repo☆496Updated 6 years ago