salesforce / hasshLinks
HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints can be easily stored, searched and shared in the form of a small MD5 fingerprint.
☆544Updated 8 months ago
Alternatives and similar repositories for hassh
Users that are interested in hassh are comparing it to the libraries listed below
Sorting:
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆679Updated 2 years ago
- Code + documentation for the public GreyNoise API☆315Updated 4 years ago
- Generic Low Interaction Honeypot☆295Updated 2 weeks ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆823Updated 5 years ago
- Super Next generation Advanced Reactive honEypot☆472Updated last year
- Python library for connecting to CertStream☆468Updated last year
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆277Updated 6 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆478Updated this week
- a network packet capture compiler☆205Updated 3 years ago
- Cross-platform Yara scanner written in Go☆328Updated 2 years ago
- A network packet forensics tool for SSH☆254Updated 4 years ago
- He who flays the hide☆230Updated last year
- Credentials catching honeypot☆387Updated last year
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆552Updated 2 years ago
- Modular file scanning/analysis framework☆624Updated 6 years ago
- Ready to run scripts for network analysis☆91Updated 9 months ago
- Suricata Extreme Performance Tuning guide☆214Updated 7 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆510Updated last month
- 16,432 Free Yara rules created by☆391Updated 6 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 4 years ago
- Passive DNS collection using Zeek☆182Updated 2 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆290Updated 8 years ago
- Axeman is a utility to retrieve certificates from Certificate Transparency Lists (CTLs)☆227Updated 2 years ago
- Data exfiltration over DNS request covert channel☆879Updated last year
- DejaVU - Open Source Deception Framework☆425Updated 5 months ago
- Home of the dionaea honeypot☆786Updated last year
- An open standard for hashing network flows into identifiers, a.k.a "Community IDs".☆192Updated last year
- AI-based, context-driven network device ranking☆302Updated last year
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Security event correlation engine for ELK stack☆447Updated last year