salesforce / jarm
☆1,153Updated last year
Related projects: ⓘ
- JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.☆2,668Updated 11 months ago
- Fast Go Application Scanner☆1,720Updated 3 weeks ago
- JA4+ is a suite of network fingerprinting standards☆884Updated last week
- Warning lists to inform users of MISP about potential false-positives or other information in indicators☆516Updated 2 weeks ago
- Data exfiltration over DNS request covert channel☆842Updated 4 months ago
- YARA signature and IOC database for my scanners and tools☆2,445Updated this week
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆529Updated 6 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,503Updated 2 months ago
- A list of cyber-chef recipes and curated links☆2,003Updated 3 months ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,243Updated 5 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆1,905Updated this week
- Guidance for mitigation web shells. #nsacyber☆961Updated last year
- Open Source EDR for Windows☆1,137Updated last year
- Python library for connecting to CertStream☆425Updated last month
- Interesting APT Report Collection And Some Special IOC☆2,369Updated this week
- yarGen is a generator for YARA rules☆1,533Updated 3 months ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆650Updated 10 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,441Updated last year
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,357Updated last week
- Detect Tactics, Techniques & Combat Threats☆2,040Updated 4 months ago
- The Python interface for YARA☆648Updated 3 months ago
- ReversingLabs YARA Rules☆744Updated last week
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,363Updated last week
- Extract and aggregate threat intelligence.☆820Updated 7 months ago
- Indicators from Unit 42 Public Reports☆696Updated last week
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆2,920Updated 2 months ago
- Defences against Cobalt Strike☆1,270Updated 2 years ago
- ☆1,048Updated 5 years ago
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact☆1,489Updated 3 months ago
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆670Updated last year