salesforce / hassh
HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints can be easily stored, searched and shared in the form of a small MD5 fingerprint.
☆533Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for hassh
- Code + documentation for the public GreyNoise API☆313Updated 3 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆658Updated last year
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆778Updated 4 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆431Updated last week
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆285Updated 7 years ago
- 16,432 Free Yara rules created by☆380Updated 5 years ago
- Cross-platform Yara scanner written in Go☆330Updated last year
- Suricata, Snort and Zeek IDS rule and pcap testing system☆452Updated this week
- Python library for connecting to CertStream☆426Updated 3 months ago
- Modular file scanning/analysis framework☆616Updated 5 years ago
- A repository for using osquery for incident detection and response☆828Updated 2 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆718Updated 4 years ago
- Detecting ATT&CK techniques & tactics for Linux☆256Updated 4 years ago
- osquery extensions by Trail of Bits☆262Updated last year
- Malware Configuration And Payload Extraction☆747Updated 2 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆537Updated last year
- Security event correlation engine for ELK stack☆434Updated 4 months ago
- DPS' Lightweight Investigation Notebook☆423Updated 10 months ago
- Suricata Extreme Performance Tuning guide☆204Updated 6 years ago
- An information security preparedness tool to do adversarial simulation.☆1,102Updated 5 years ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆446Updated last year
- Generic Low Interaction Honeypot☆245Updated this week
- a network packet capture compiler☆194Updated 2 years ago
- Machinae Security Intelligence Collector☆504Updated 6 months ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆274Updated 5 years ago
- Data exfiltration over DNS request covert channel☆848Updated 6 months ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆776Updated last year
- ☆1,051Updated 5 years ago
- An open standard for hashing network flows into identifiers, a.k.a "Community IDs".☆171Updated last month
- DejaVU - Open Source Deception Framework☆400Updated last year