salesforce / jarm
☆1,193Updated last year
Alternatives and similar repositories for jarm:
Users that are interested in jarm are comparing it to the libraries listed below
- JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.☆2,826Updated last year
- Fast Go Application Scanner☆1,790Updated last week
- JA4+ is a suite of network fingerprinting standards☆1,086Updated this week
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆533Updated 10 months ago
- A list of cyber-chef recipes and curated links☆2,049Updated 7 months ago
- Open Source EDR for Windows☆1,168Updated last year
- Warning lists to inform users of MISP about potential false-positives or other information in indicators☆547Updated this week
- Data exfiltration over DNS request covert channel☆855Updated 8 months ago
- ReversingLabs YARA Rules☆780Updated last month
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,507Updated 6 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,022Updated this week
- An Active Defense and EDR software to empower Blue Teams☆1,249Updated last year
- A set of Zeek scripts to detect ATT&CK techniques.☆571Updated 6 months ago
- Defences against Cobalt Strike☆1,282Updated 2 years ago
- YARA signature and IOC database for my scanners and tools☆2,525Updated last month
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,412Updated last month
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,278Updated 9 months ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,277Updated 2 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆373Updated last week
- Extract and aggregate threat intelligence.☆840Updated 11 months ago
- A query aggregator for OSINT based threat hunting☆871Updated last week
- yarGen is a generator for YARA rules☆1,586Updated 7 months ago
- Elastic Security detection content for Endpoint☆1,084Updated this week
- Detect Tactics, Techniques & Combat Threats☆2,091Updated last week
- Cyber Analytics Repository☆916Updated 9 months ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆663Updated last year
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆569Updated this week
- Automatically created C2 Feeds☆554Updated this week
- AIL framework - Analysis Information Leak framework☆641Updated this week
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,834Updated last month