salesforce / jarmLinks
☆1,277Updated 2 years ago
Alternatives and similar repositories for jarm
Users that are interested in jarm are comparing it to the libraries listed below
Sorting:
- JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.☆3,035Updated 7 months ago
- Warning lists to inform users of MISP about potential false-positives or other information in indicators☆594Updated this week
- Data exfiltration over DNS request covert channel☆876Updated last year
- Fast Application Layer Scanner☆2,016Updated last week
- JA4+ is a suite of network fingerprinting standards☆1,660Updated 3 weeks ago
- Guidance for mitigation web shells. #nsacyber☆982Updated 2 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆543Updated 7 months ago
- Automatically created C2 Feeds☆655Updated this week
- Python library for connecting to CertStream☆465Updated last year
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,344Updated last year
- A list of cyber-chef recipes and curated links☆2,150Updated last year
- Open Source EDR for Windows☆1,281Updated 2 years ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,288Updated this week
- YARA signature and IOC database for my scanners and tools☆2,816Updated last week
- Extract and aggregate threat intelligence.☆890Updated last year
- Elastic Security detection content for Endpoint☆1,338Updated this week
- Suricata, Snort and Zeek IDS rule and pcap testing system☆508Updated last week
- A set of Zeek scripts to detect ATT&CK techniques.☆618Updated last year
- A collection of red team and adversary emulation resources developed and released by MITRE.☆526Updated 4 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,509Updated last year
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆676Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,240Updated last month
- Defences against Cobalt Strike☆1,293Updated 3 years ago
- Your Everyday Threat Intelligence☆1,939Updated last month
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,538Updated 3 weeks ago
- ☆554Updated 2 years ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,396Updated last year
- ☆2,665Updated last year
- Interesting APT Report Collection And Some Special IOCs☆2,788Updated this week
- Collaborative Malware Analysis Platform at Scale☆769Updated 3 weeks ago