salesforce / hasshLinks
HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints can be easily stored, searched and shared in the form of a small MD5 fingerprint.
☆542Updated last month
Alternatives and similar repositories for hassh
Users that are interested in hassh are comparing it to the libraries listed below
Sorting:
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆671Updated last year
- Code + documentation for the public GreyNoise API☆315Updated 4 years ago
- Cross-platform Yara scanner written in Go☆328Updated 2 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆480Updated 3 weeks ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆793Updated 4 years ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆272Updated 6 years ago
- Axeman is a utility to retrieve certificates from Certificate Transparency Lists (CTLs)☆223Updated last year
- a network packet capture compiler☆200Updated 3 years ago
- Python library for connecting to CertStream☆448Updated 10 months ago
- A network packet forensics tool for SSH☆253Updated 4 years ago
- DejaVU - Open Source Deception Framework☆411Updated 2 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆461Updated last week
- Credentials catching honeypot☆379Updated last year
- Data exfiltration over DNS request covert channel☆867Updated last year
- Machinae Security Intelligence Collector☆526Updated last year
- TLS Fingerprinting☆388Updated 4 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 3 years ago
- ☆172Updated 3 years ago
- Super Next generation Advanced Reactive honEypot☆464Updated last year
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- Pattern recognition for hosts, services, and content☆726Updated last week
- DPS' Lightweight Investigation Notebook☆432Updated last year
- Python low-interaction honeyclient☆1,016Updated last week
- 16,432 Free Yara rules created by☆384Updated 6 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- Golang IPv6 address enumeration☆357Updated 6 years ago
- Suricata Extreme Performance Tuning guide☆209Updated 7 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆376Updated 3 years ago
- Yara integrated software to handle archive file data.☆311Updated 3 years ago
- osquery extensions by Trail of Bits☆265Updated 2 years ago