salesforce / jarmLinks
☆1,258Updated 2 years ago
Alternatives and similar repositories for jarm
Users that are interested in jarm are comparing it to the libraries listed below
Sorting:
- JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.☆2,998Updated 4 months ago
- Warning lists to inform users of MISP about potential false-positives or other information in indicators☆586Updated this week
- JA4+ is a suite of network fingerprinting standards☆1,504Updated 2 weeks ago
- Open Source EDR for Windows☆1,274Updated 2 years ago
- Guidance for mitigation web shells. #nsacyber☆981Updated 2 years ago
- Fast Application Layer Scanner☆1,949Updated last week
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,513Updated last month
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,325Updated last year
- Elastic Security detection content for Endpoint☆1,286Updated this week
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆541Updated 4 months ago
- Data exfiltration over DNS request covert channel☆871Updated last year
- Detect Tactics, Techniques & Combat Threats☆2,199Updated last month
- Python library for connecting to CertStream☆457Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,514Updated last year
- A list of cyber-chef recipes and curated links☆2,131Updated last year
- Automatically created C2 Feeds☆643Updated this week
- YARA signature and IOC database for my scanners and tools☆2,738Updated this week
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,372Updated 10 months ago
- A collection of red team and adversary emulation resources developed and released by MITRE.☆518Updated 4 years ago
- Defences against Cobalt Strike☆1,292Updated 3 years ago
- Extract and aggregate threat intelligence.☆882Updated last year
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,216Updated last week
- Sophos-originated indicators-of-compromise from published reports☆631Updated last month
- Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red…☆952Updated last week
- An Active Defense and EDR software to empower Blue Teams☆1,294Updated 2 years ago
- Real-time, container-based file scanning at enterprise scale☆948Updated last week
- yarGen is a generator for YARA rules☆1,708Updated 5 months ago
- Indicators from Unit 42 Public Reports☆723Updated last month
- Re-play Security Events☆1,676Updated last year
- ☆2,664Updated last year