salesforce / jarm
☆1,215Updated last year
Alternatives and similar repositories for jarm:
Users that are interested in jarm are comparing it to the libraries listed below
- JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.☆2,907Updated last year
- JA4+ is a suite of network fingerprinting standards☆1,227Updated this week
- Data exfiltration over DNS request covert channel☆866Updated 11 months ago
- Warning lists to inform users of MISP about potential false-positives or other information in indicators☆565Updated 2 weeks ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆539Updated last year
- Open Source EDR for Windows☆1,210Updated 2 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,508Updated 9 months ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,301Updated last year
- Python library for connecting to CertStream☆443Updated 8 months ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,324Updated 5 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,568Updated last year
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,451Updated 3 weeks ago
- An Active Defense and EDR software to empower Blue Teams☆1,271Updated last year
- Defences against Cobalt Strike☆1,281Updated 2 years ago
- AIL framework - Analysis Information Leak framework☆717Updated this week
- Detect Tactics, Techniques & Combat Threats☆2,141Updated 2 months ago
- ReversingLabs YARA Rules☆814Updated last week
- Guidance for mitigation web shells. #nsacyber☆973Updated last year
- yarGen is a generator for YARA rules☆1,626Updated last week
- Zeek-Formatted Threat Intelligence Feeds☆359Updated this week
- Automatically created C2 Feeds☆600Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆401Updated 2 weeks ago
- Open Source Security Events Metadata (OSSEM)☆1,261Updated 2 years ago
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact☆1,657Updated last month
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,095Updated 2 weeks ago
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆677Updated last year
- Re-play Security Events☆1,635Updated last year
- Fast Application Layer Scanner☆1,849Updated this week
- YARA signature and IOC database for my scanners and tools☆2,596Updated this week
- Utilities for Sysmon☆1,513Updated last month