adding JA3
parent
428bb507fb
commit
8f4a5a0666
|
@ -8,6 +8,7 @@
|
|||
|
||||
- [Threat Detection and Hunting](#threat-detection-and-hunting)
|
||||
- [Tools](#tools)
|
||||
- [DataSet](#dataset)
|
||||
- [Resources](#resources)
|
||||
- [Frameworks](#frameworks)
|
||||
- [Research Papers](#research-papers)
|
||||
|
@ -50,6 +51,7 @@
|
|||
- [sqhunter](https://github.com/0x4D31/sqhunter) - A simple threat hunting tool based on osquery, Salt Open and Cymon API.
|
||||
- [RedHunt-OS](https://github.com/redhuntlabs/RedHunt-OS) - A Virtual Machine for Adversary Emulation and Threat Hunting. RedHunt aims to be a one stop shop for all your threat emulation and threat hunting needs by integrating attacker's arsenal as well as defender's toolkit to actively identify the threats in your environment.
|
||||
- [Oriana](https://github.com/mvelazc0/Oriana) - Lateral movement and threat hunting tool for Windows environments built on Django comes Docker ready.
|
||||
- [JA3](https://github.com/salesforce/ja3) - A method for profiling SSL/TLS Clients
|
||||
|
||||
### Resources
|
||||
|
||||
|
@ -82,6 +84,7 @@
|
|||
- [Catching attackers with go-audit and a logging pipeline](https://summitroute.com/blog/2016/12/25/Catching_attackers_with_go-audit_and_a_logging_pipeline/)
|
||||
- [The Coventry Conundrum of Threat Intelligence](https://summitroute.com/blog/2015/06/10/the_conventry_conundrum_of_threat_intelligence/)
|
||||
- [Signal the ATT&CK: Part 1](https://www.pwc.co.uk/issues/cyber-security-data-privacy/research/signal-att-and-ck-part-1.html) - Building a real-time threat detection capability with Tanium that focuses on documented adversarial techniques.
|
||||
- [JA3: SSL/TLS Client Fingerprinting for Malware Detection](https://engineering.salesforce.com/open-sourcing-ja3-92c9e53c3c41)
|
||||
|
||||
#### Frameworks
|
||||
|
||||
|
@ -186,6 +189,7 @@
|
|||
- [Derbycon 2015 - Intrusion Hunting for the Masses A Practical Guide](https://www.youtube.com/watch?v=MUUseTJp3jM)
|
||||
- [BSides DC 2016 - Practical Cyborgism: Getting Start with Machine Learning for Incident Detection](https://www.youtube.com/watch?v=2FvP7nwb2UE&feature=youtu.be)
|
||||
- [SANS Webcast 2018 - What Event Logs? Part 1: Attacker Tricks to Remove Event Logs](https://www.youtube.com/watch?v=7JIftAw8wQY)
|
||||
- [Profiling And Detecting All Things SSL With JA3](https://www.youtube.com/watch?v=oprPu7UIEuk)
|
||||
|
||||
|
||||
### Trainings
|
||||
|
|
Loading…
Reference in New Issue