salesforce / hasshLinks
HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints can be easily stored, searched and shared in the form of a small MD5 fingerprint.
☆540Updated 3 weeks ago
Alternatives and similar repositories for hassh
Users that are interested in hassh are comparing it to the libraries listed below
Sorting:
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆669Updated last year
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆792Updated 4 years ago
- Python library for connecting to CertStream☆446Updated 10 months ago
- Code + documentation for the public GreyNoise API☆315Updated 4 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆479Updated last week
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆453Updated last year
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆722Updated 5 years ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆271Updated 6 years ago
- Cross-platform Yara scanner written in Go☆328Updated 2 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆458Updated last week
- 16,432 Free Yara rules created by☆383Updated 5 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆544Updated 2 years ago
- Generic Low Interaction Honeypot☆277Updated this week
- Modular file scanning/analysis framework☆618Updated 5 years ago
- Machinae Security Intelligence Collector☆523Updated last year
- A network packet forensics tool for SSH☆252Updated 4 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 3 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- Malware Configuration And Payload Extraction☆757Updated 6 months ago
- DPS' Lightweight Investigation Notebook☆430Updated last year
- a network packet capture compiler☆199Updated 3 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆368Updated last year
- Data exfiltration over DNS request covert channel☆866Updated last year
- FAME Automates Malware Evaluation☆898Updated last month
- Protocol Analysis/Decoder Framework☆492Updated 2 years ago
- Mapping the MITRE ATT&CK Matrix with Osquery