zk7 / hershelplusLinks
An improved algorithm for large scale OS fingerprinting
☆19Updated 7 years ago
Alternatives and similar repositories for hershelplus
Users that are interested in hershelplus are comparing it to the libraries listed below
Sorting:
- Advanced threat detection solution for Linux.☆35Updated 4 years ago
- Some of the presentations given by me☆19Updated 3 months ago
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆75Updated 2 years ago
- JA4TScan is an active TCP server fingerprinting tool.☆94Updated last year
- Generic and transparent TLS inspection for local programs☆24Updated last year
- ☆21Updated last year
- Script to chain search parameters for MalwareBazaar☆12Updated 9 months ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆91Updated last year
- Provides a multi-platform Graphical User Interface for hashlookup☆12Updated last year
- Tricard - Malware Sandbox Fingerprinting☆22Updated last year
- Presentations from the CX Security Labs team☆35Updated 3 months ago
- An eBPF detection program for CVE-2022-0847☆28Updated 3 years ago
- ☆19Updated last year
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Updated last year
- High fidelity JA3 & JA3S combinations for known botnets and alike☆11Updated 6 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Updated 3 years ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆121Updated last month
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago
- This tool was open sourced as part of JARM Randomizer: Evading JARM Fingerprinting for HiTB Amsterdam 2021.☆49Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 9 months ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆118Updated 2 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- QuasarRAT analysis tools and research report☆27Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- Identifies metadata of .NET binary files.☆21Updated last year