fatt Logo

fatt

0
Free
Visit Website

A script for extracting network metadata and fingerprints such as JA3 and HASSH from packet capture files (pcap) or live network traffic. The main use-case is for monitoring honeypots, but you can also use it for other use cases such as network forensic analysis. fatt works on Linux, macOS and Windows. Note that fatt uses pyshark (a python wrapper for tshark) and therefore the performance is not great! But that's not a big issue as obviously this is not a tool you use in production. You can use other network analysis tools such as Bro/Zeek, Suricata or Netcap for more serious use cases. Joy is another great tool you can use for capturing and analyzing network flow data. Other than that, I'm working on a go based version of fatt which is faster, and you can use its libraries in your gopacket based tools such as packetbeat. I released the initial version of its gQUIC library (QUICk). Features Protocol support: SSL/TLS, SSH, RDP, HTTP, gQUIC. To be added soon: IETF QUIC, MySQL, MSSQL, etc.

FEATURES

ALTERNATIVES

Fast passive subdomain enumeration tool

A multi-tool for subdomain enumeration

Port listener / honeypot in Rust with protocol guessing, safe string display and rudimentary SQLite logging.

A specialized packet sniffer for displaying and logging HTTP traffic, designed to capture, parse, and log traffic for later analysis.

A simple text viewer for Prompt(1) sessions

Hale is a botnet command & control monitor/spy with a modular design and various monitoring capabilities, including IRC and HTTP, to aid in botnet hunting and research.

Passive sniffer tool for analyzing traffic patterns.

Provides AI-driven cybersecurity solutions including assessments, training, compliance services, and insurance audits to help organizations reduce risk and build a security-aware culture.