salesforce / jarmLinks
☆1,279Updated 2 years ago
Alternatives and similar repositories for jarm
Users that are interested in jarm are comparing it to the libraries listed below
Sorting:
- Warning lists to inform users of MISP about potential false-positives or other information in indicators☆603Updated 2 weeks ago
- JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.☆3,048Updated 8 months ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆544Updated 8 months ago
- Guidance for mitigation web shells. #nsacyber☆981Updated 2 years ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,347Updated last year
- Automatically created C2 Feeds☆660Updated this week
- Data exfiltration over DNS request covert channel☆881Updated last year
- Python library for connecting to CertStream☆470Updated last year
- Defences against Cobalt Strike☆1,291Updated 3 years ago
- Fast Application Layer Scanner☆2,050Updated last week
- Open Source EDR for Windows☆1,290Updated 2 years ago
- JA4+ is a suite of network fingerprinting standards☆1,734Updated 3 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,512Updated 2 weeks ago
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact☆1,750Updated 5 months ago
- Elastic Security detection content for Endpoint☆1,365Updated 2 weeks ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,398Updated last year
- A list of cyber-chef recipes and curated links☆2,178Updated last year
- Extract and aggregate threat intelligence.☆895Updated last year
- ☆553Updated 2 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,545Updated 2 months ago
- Sophos-originated indicators-of-compromise from published reports☆647Updated last week
- ReversingLabs YARA Rules☆891Updated 2 months ago
- YARA signature and IOC database for my scanners and tools☆2,845Updated 3 weeks ago
- A collection of red team and adversary emulation resources developed and released by MITRE.☆530Updated 4 years ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆807Updated 2 years ago
- Real-time, container-based file scanning at enterprise scale☆970Updated last week
- A set of Zeek scripts to detect ATT&CK techniques.☆617Updated last year
- yarGen is a generator for YARA rules☆1,770Updated 2 weeks ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆679Updated 2 years ago
- Indicators from Unit 42 Public Reports☆728Updated 5 months ago