salesforce / jarm
☆1,201Updated last year
Alternatives and similar repositories for jarm:
Users that are interested in jarm are comparing it to the libraries listed below
- JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.☆2,858Updated last year
- JA4+ is a suite of network fingerprinting standards☆1,144Updated this week
- Warning lists to inform users of MISP about potential false-positives or other information in indicators☆554Updated last week
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆535Updated 11 months ago
- Python library for connecting to CertStream☆435Updated 6 months ago
- Fast Application Layer Scanner☆1,816Updated this week
- Data exfiltration over DNS request covert channel☆856Updated 9 months ago
- Automatically created C2 Feeds☆584Updated this week
- Guidance for mitigation web shells. #nsacyber☆972Updated last year
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,298Updated 3 months ago
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆677Updated last year
- Open Source EDR for Windows☆1,182Updated last year
- yarGen is a generator for YARA rules☆1,602Updated 8 months ago
- Defences against Cobalt Strike☆1,284Updated 2 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,429Updated 2 weeks ago
- ReversingLabs YARA Rules☆791Updated last month
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆707Updated 2 years ago
- YARA signature and IOC database for my scanners and tools☆2,554Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Updated 7 months ago
- A set of Zeek scripts to detect ATT&CK techniques.☆576Updated 7 months ago
- A list of Domain Frontable Domains by CDN☆568Updated 3 years ago
- A list of cyber-chef recipes and curated links☆2,060Updated 8 months ago
- Extract and aggregate threat intelligence.☆846Updated last year
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆664Updated last year
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆523Updated this week
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,250Updated last year
- Indicators from Unit 42 Public Reports☆707Updated 3 weeks ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,046Updated last month
- Repository of YARA rules made by Trellix ATR Team☆576Updated last year
- Sophos-originated indicators-of-compromise from published reports☆565Updated 2 weeks ago