salesforce / hassh
HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints can be easily stored, searched and shared in the form of a small MD5 fingerprint.
☆541Updated last year
Alternatives and similar repositories for hassh:
Users that are interested in hassh are comparing it to the libraries listed below
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆665Updated last year
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆786Updated 4 years ago
- Code + documentation for the public GreyNoise API☆314Updated 3 years ago
- Python library for connecting to CertStream☆440Updated 7 months ago
- Machinae Security Intelligence Collector☆507Updated 10 months ago
- A network packet forensics tool for SSH☆255Updated 4 years ago
- Cross-platform Yara scanner written in Go☆329Updated 2 years ago
- Modular file scanning/analysis framework☆620Updated 5 years ago
- Axeman is a utility to retrieve certificates from Certificate Transparency Lists (CTLs)☆222Updated last year
- 16,432 Free Yara rules created by☆383Updated 5 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆449Updated 2 weeks ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆472Updated 2 months ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆477Updated 3 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆543Updated last year
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- A repository for using osquery for incident detection and response☆840Updated 2 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- DFIRTrack - The Incident Response Tracking Application☆492Updated 6 months ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆324Updated 6 months ago
- Pattern recognition for hosts, services, and content☆692Updated this week
- a network packet capture compiler☆197Updated 2 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆721Updated 5 years ago
- Online hash checker for Virustotal and other services☆822Updated 10 months ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆646Updated 3 months ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆598Updated 9 months ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆372Updated 2 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆273Updated 6 years ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆790Updated last year
- Automated deployment scripts for the RockNSM network hunting distribution.☆450Updated last year