salesforce / hassh
HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints can be easily stored, searched and shared in the form of a small MD5 fingerprint.
☆539Updated last year
Alternatives and similar repositories for hassh:
Users that are interested in hassh are comparing it to the libraries listed below
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆665Updated last year
- Cross-platform Yara scanner written in Go☆329Updated 2 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆787Updated 4 years ago
- Code + documentation for the public GreyNoise API☆314Updated 4 years ago
- Python library for connecting to CertStream☆443Updated 8 months ago
- 16,432 Free Yara rules created by☆383Updated 5 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- osquery extensions by Trail of Bits☆264Updated 2 years ago
- A network packet forensics tool for SSH☆253Updated 4 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆543Updated last year
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆272Updated 6 years ago
- Modular file scanning/analysis framework☆619Updated 5 years ago
- ☆167Updated 3 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆722Updated 5 years ago
- The pattern matching swiss knife☆138Updated 5 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 3 years ago
- Data exfiltration over DNS request covert channel☆866Updated 11 months ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆453Updated last week
- Machinae Security Intelligence Collector☆510Updated 11 months ago
- a network packet capture compiler☆198Updated 2 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆474Updated 3 months ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- FAME Automates Malware Evaluation☆889Updated 3 weeks ago
- Pattern Extractor for Obfuscated Code☆297Updated 3 years ago
- DFIRTrack - The Incident Response Tracking Application☆498Updated 7 months ago
- DejaVU - Open Source Deception Framework☆410Updated 2 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆500Updated 2 years ago
- Decept Network Protocol Proxy☆276Updated 2 years ago
- Respounder detects presence of responder in the network.☆316Updated 5 years ago
- DPS' Lightweight Investigation Notebook☆429Updated last year