JA3 is a method for creating SSL/TLS client fingerprints that can be easily shared for threat intelligence. It was invented at Salesforce in 2017 but is now maintained by John Althouse at FoxIO-LLC. The project includes JA3 and JA3S scripts for Zeek and Python, with support added to various cybersecurity tools and platforms.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A Bluetooth 5 and 4.x sniffer using TI CC1352/CC26x2 hardware with advanced features and Python-based host-side software.
Snort is an open source intrusion prevention system that uses rules to detect and prevent malicious network activity.
Tor Browser is a free and open-source software that allows users to browse the internet anonymously and privately.
WireGuard is a fast, simple, and secure VPN that uses cutting-edge cryptography, designed for ease of use and performance.
A suite for man in the middle attacks, featuring sniffing of live connections, content filtering, and protocol dissection.
Unfurl is a URL analysis tool that extracts and visualizes data from URLs, breaking them down into components and presenting the information visually.
Tcpdump is a command-line packet analyzer for capturing and analyzing network traffic.
WiGLE.net is a platform that collects and provides data on WiFi networks and cell towers, with over 1.3 billion networks collected.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.