salesforce / jarm
☆1,224Updated last year
Alternatives and similar repositories for jarm
Users that are interested in jarm are comparing it to the libraries listed below
Sorting:
- JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.☆2,927Updated 2 weeks ago
- Guidance for mitigation web shells. #nsacyber☆972Updated last year
- A list of cyber-chef recipes and curated links☆2,080Updated 11 months ago
- JA4+ is a suite of network fingerprinting standards☆1,279Updated last week
- Fast Application Layer Scanner☆1,868Updated this week
- YARA signature and IOC database for my scanners and tools☆2,619Updated this week
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆540Updated 2 weeks ago
- Data exfiltration over DNS request covert channel☆867Updated last year
- Warning lists to inform users of MISP about potential false-positives or other information in indicators☆570Updated this week
- Defences against Cobalt Strike☆1,283Updated 2 years ago
- yarGen is a generator for YARA rules☆1,642Updated last month
- Interesting APT Report Collection And Some Special IOC☆2,551Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,509Updated 10 months ago
- Python library for connecting to CertStream☆447Updated 9 months ago
- The Python interface for YARA☆691Updated 2 weeks ago
- A tool to abuse Exchange services☆2,224Updated 11 months ago
- ☆2,661Updated last year
- ReversingLabs YARA Rules☆817Updated last month
- Automatically created C2 Feeds☆613Updated this week
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆677Updated 2 years ago
- Indicators from Unit 42 Public Reports☆711Updated 3 weeks ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,334Updated 6 months ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,470Updated this week
- A list of Domain Frontable Domains by CDN☆567Updated 3 years ago
- Open Source EDR for Windows☆1,236Updated 2 years ago
- A MITM (monster-in-the-middle) detection tool. Used to build MALCOLM:☆809Updated last year
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,132Updated 3 weeks ago
- A set of Zeek scripts to detect ATT&CK techniques.☆589Updated 10 months ago
- ☆543Updated last year
- Elastic Security detection content for Endpoint☆1,193Updated last week