All Projects → CUCyber → ja3transport

CUCyber / ja3transport

Licence: MIT license
Impersonating JA3 signatures

Programming Languages

go
31211 projects - #10 most used programming language

Projects that are alternatives of or similar to ja3transport

Rubyfu
Rubyfu, where Ruby goes evil!
Stars: ✭ 228 (+14%)
Mutual labels:  red-team
aterm
It records your terminal, then lets you upload to ASHIRT
Stars: ✭ 17 (-91.5%)
Mutual labels:  red-team
palinka c2
Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-93%)
Mutual labels:  red-team
Red Team Infrastructure Wiki
Wiki to collect Red Team infrastructure hardening resources
Stars: ✭ 2,981 (+1390.5%)
Mutual labels:  red-team
github-watchman
Monitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (-70%)
Mutual labels:  red-team
readhook
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
Stars: ✭ 31 (-84.5%)
Mutual labels:  red-team
Dart
DART is a test documentation tool created by the Lockheed Martin Red Team to document and report on penetration tests, especially in isolated network environments.
Stars: ✭ 207 (+3.5%)
Mutual labels:  red-team
Kali-TX
Customized Kali Linux - Ansible playbook
Stars: ✭ 54 (-73%)
Mutual labels:  red-team
AlanFramework
A C2 post-exploitation framework
Stars: ✭ 405 (+102.5%)
Mutual labels:  red-team
LAZYPARIAH
A tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (-39.5%)
Mutual labels:  red-team
hackarsenaltoolkit
Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools
Stars: ✭ 39 (-80.5%)
Mutual labels:  red-team
InlineWhispers2
Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
Stars: ✭ 156 (-22%)
Mutual labels:  red-team
passwordstate-decryptor
PowerShell script that decrypts password entries from a Passwordstate server.
Stars: ✭ 19 (-90.5%)
Mutual labels:  red-team
Physmem2profit
Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely
Stars: ✭ 244 (+22%)
Mutual labels:  red-team
CycleTLS
Spoof TLS/JA3 fingerprints in GO and Javascript
Stars: ✭ 362 (+81%)
Mutual labels:  ja3
Caldera
Automated Adversary Emulation Platform
Stars: ✭ 3,126 (+1463%)
Mutual labels:  red-team
DcRat
A simple remote tool in C#.
Stars: ✭ 709 (+254.5%)
Mutual labels:  red-team
pwn-pulse
Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Stars: ✭ 126 (-37%)
Mutual labels:  red-team
AutoWin
Autowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.
Stars: ✭ 18 (-91%)
Mutual labels:  red-team
WMEye
WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement
Stars: ✭ 315 (+57.5%)
Mutual labels:  red-team

JA3Transport

GoDoc Go Report Card

For a more in-depth look at the library, check out our blogpost.

Abstract

JA3 is a method for fingerprinting TLS clients using options in the TLS ClientHello packet like SSL version and available client extensions. At its core, this method of detecting malicious traffic is marginally better than the User-Agent header in HTTP since the client is in control of the ClientHello packet. Currently, there is no tooling available to easily craft ClientHello packets, so the JA3 hash is a great detection mechanism. A team of two members from CU Cyber have created a Go library that makes it easy to mock JA3 signatures.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].