salesforce / jarm
☆1,171Updated last year
Related projects ⓘ
Alternatives and complementary repositories for jarm
- JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.☆2,773Updated last year
- JA4+ is a suite of network fingerprinting standards☆991Updated last week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆1,968Updated this week
- Fast Go Application Scanner☆1,762Updated last week
- Data exfiltration over DNS request covert channel☆848Updated 6 months ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆533Updated 8 months ago
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆670Updated last year
- A list of Domain Frontable Domains by CDN☆565Updated 2 years ago
- A list of cyber-chef recipes and curated links☆2,030Updated 5 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,508Updated 4 months ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆658Updated last year
- Open Source EDR for Windows☆1,152Updated last year
- An Active Defense and EDR software to empower Blue Teams☆1,239Updated last year
- A MITM (monster-in-the-middle) detection tool. Used to build MALCOLM:☆808Updated 7 months ago
- Defences against Cobalt Strike☆1,281Updated 2 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,396Updated 2 months ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,384Updated 2 months ago
- Detect Tactics, Techniques & Combat Threats☆2,067Updated 2 weeks ago
- Python library for connecting to CertStream☆426Updated 3 months ago
- 🕳 godoh - A DNS-over-HTTPS C2☆751Updated 11 months ago
- Interesting APT Report Collection And Some Special IOC☆2,439Updated this week
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,237Updated last year
- A query aggregator for OSINT based threat hunting☆864Updated last week
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆812Updated 2 months ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,261Updated 7 months ago
- ☆2,651Updated 8 months ago
- Your Everyday Threat Intelligence☆1,749Updated this week
- Re-play Security Events☆1,604Updated 8 months ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆452Updated this week
- A set of Zeek scripts to detect ATT&CK techniques.☆565Updated 4 months ago