zk7 / hershelplus
An improved algorithm for large scale OS fingerprinting
☆17Updated 6 years ago
Alternatives and similar repositories for hershelplus
Users that are interested in hershelplus are comparing it to the libraries listed below
Sorting:
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆69Updated 2 years ago
- JA4TScan is an active TCP server fingerprinting tool.☆76Updated 8 months ago
- High fidelity JA3 & JA3S combinations for known botnets and alike☆11Updated 6 years ago
- ZMapv6: Internet Scanner with IPv6 capabilities☆109Updated 2 months ago
- goscanner is a tool for large-scale TLS and SSH scans☆31Updated 11 months ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- This tool was open sourced as part of JARM Randomizer: Evading JARM Fingerprinting for HiTB Amsterdam 2021.☆48Updated last year
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆31Updated last year
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 9 months ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆31Updated 3 weeks ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆114Updated 3 months ago
- JA3 TLS Fingerprint database☆79Updated 5 years ago
- Presentations from the CX Security Labs team☆33Updated 7 months ago
- Malware and PCAP☆11Updated last year
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆41Updated 9 months ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- ☆24Updated 11 months ago
- IPv6 Internet Wide Scanning☆18Updated last month
- Pure python parser for Snort/Suricata rules.☆31Updated last year
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated 3 months ago
- A CALDERA plugin☆66Updated last month
- QuasarRAT analysis tools and research report☆27Updated last year
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆23Updated 2 years ago
- ssdeep cluster analysis for malware files☆30Updated 4 years ago
- suricata rules to pcap☆9Updated 4 years ago
- Around the finger, tenderness, wrapped around the world, 24 days ago, ⋅ 3 reading Collect and organize various webshells to do webshell d…☆24Updated 6 years ago
- SADDNS: Side Channel Based DNS Cache Poisoning Attack☆56Updated 3 years ago
- Look into EDR events from network☆23Updated 2 weeks ago
- Operating system remote fingerprinting attack and detection tools☆55Updated 11 years ago
- Some of the presentations given by me☆18Updated 6 months ago