zk7 / hershelplus
An improved algorithm for large scale OS fingerprinting
☆17Updated 6 years ago
Alternatives and similar repositories for hershelplus:
Users that are interested in hershelplus are comparing it to the libraries listed below
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 3 years ago
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆68Updated 2 years ago
- ZMapv6: Internet Scanner with IPv6 capabilities☆109Updated 2 months ago
- This is an open source Snort rules repository☆30Updated 2 years ago
- High fidelity JA3 & JA3S combinations for known botnets and alike☆11Updated 6 years ago
- This tool was open sourced as part of JARM Randomizer: Evading JARM Fingerprinting for HiTB Amsterdam 2021.☆48Updated last year
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- goscanner is a tool for large-scale TLS and SSH scans☆31Updated 11 months ago
- Presentations from the CX Security Labs team☆33Updated 6 months ago
- Advanced threat detection solution for Linux.☆36Updated 4 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆41Updated 8 months ago
- Passive Security Tools Fingerprinting Framework☆73Updated 4 years ago
- ☆23Updated 4 years ago
- pyJARM is a library for doing JARM fingerprinting using python☆49Updated last month
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆24Updated last year
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆34Updated 4 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆31Updated last year
- IPv6 Internet Wide Scanning☆18Updated 3 weeks ago
- Suricata rule and intel index☆30Updated last month
- ☆43Updated 2 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆15Updated 2 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆23Updated 2 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- Passive-Recursive DNS daemon☆26Updated 7 months ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Updated 2 years ago
- IOCs for various malware families☆11Updated 9 months ago
- zeek-scripts☆44Updated 6 years ago
- This repository hosts community contributed Kestrel analytics☆17Updated 10 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 2 months ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 4 years ago