salesforce / jarmLinks
☆1,279Updated 2 years ago
Alternatives and similar repositories for jarm
Users that are interested in jarm are comparing it to the libraries listed below
Sorting:
- JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.☆3,061Updated 9 months ago
- Guidance for mitigation web shells. #nsacyber☆982Updated 2 years ago
- Warning lists to inform users of MISP about potential false-positives or other information in indicators☆604Updated 3 weeks ago
- Fast Application Layer Scanner☆2,062Updated 3 weeks ago
- Data exfiltration over DNS request covert channel☆881Updated last year
- Automatically created C2 Feeds☆662Updated this week
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆545Updated 9 months ago
- A list of cyber-chef recipes and curated links☆2,183Updated last year
- JA4+ is a suite of network fingerprinting standards☆1,749Updated this week
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,349Updated last year
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,548Updated 2 months ago
- YARA signature and IOC database for my scanners and tools☆2,864Updated this week
- Python library for connecting to CertStream☆470Updated last year
- Elastic Security detection content for Endpoint☆1,372Updated this week
- ☆2,665Updated last year
- Open Source EDR for Windows☆1,292Updated 2 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,514Updated 3 weeks ago
- Defences against Cobalt Strike☆1,293Updated 3 years ago
- Detect Tactics, Techniques & Combat Threats☆2,263Updated 2 weeks ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,707Updated 4 months ago
- An Active Defense and EDR software to empower Blue Teams☆1,314Updated 2 years ago
- Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake.☆1,923Updated last week
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,399Updated last year
- A set of Zeek scripts to detect ATT&CK techniques.☆618Updated last year
- A collection of red team and adversary emulation resources developed and released by MITRE.☆531Updated 4 years ago
- Sophos-originated indicators-of-compromise from published reports☆649Updated 3 weeks ago
- Pattern recognition for hosts, services, and content☆757Updated 3 weeks ago
- yarGen is a generator for YARA rules☆1,774Updated last month
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,617Updated last month
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆688Updated 2 years ago