Hfinger Logo

Hfinger

0
Free
Visit Website

Tool for fingerprinting HTTP requests of malware. Based on Tshark and written in Python3. Working prototype stage :-) Its main objective is to provide unique representations (fingerprints) of malware requests, which help in their identification. Unique means here that each fingerprint should be seen only in one particular malware family, yet one family can have multiple fingerprints. Hfinger represents the request in a shorter form than printing the whole request, but still human interpretable. Hfinger can be used in manual malware analysis but also in sandbox systems or SIEMs. The generated fingerprints are useful for grouping requests, pinpointing requests to particular malware families, identifying different operations of one family, or discovering unknown malicious requests omitted by other security systems but which share fingerprint. An academic paper accompanies work on this tool, describing, for example, the motivation of design choices, and the evaluation of the tool compared to p0f, FATT, and Mercury.

FEATURES

ALTERNATIVES

A standalone binary inspection tool for Android developers with support for various formats and dependencies.

A malware processing and analytics tool that utilizes Pig, Django, and Elasticsearch to analyze and visualize malware data.

A backend agnostic debugger frontend for debugging binaries without source code access.

A blind SQL injection tool written in Golang

Cybersecurity tool merging DarunGrim's analysis algorithms, currently in internal testing for official release.

A generator for YARA rules that creates rules from strings found in malware files while removing strings from goodware files.

IDA Pro plugin for finding crypto constants

A Unix-based tool that scans for rootkits and other malware on a system, providing a detailed report of the scan results.

PINNED