JA3 is a method for creating SSL/TLS client fingerprints that can be easily shared for threat intelligence. It was invented at Salesforce in 2017 but is now maintained by John Althouse at FoxIO-LLC. The project includes JA3 and JA3S scripts for Zeek and Python, with support added to various cybersecurity tools and platforms.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Tor Browser is a free and open-source software that allows users to browse the internet anonymously and privately.
A blog sharing packet capture files and malware samples for training and analysis, with archived posts and traffic analysis exercises.
Tcpdump is a command-line packet analyzer for capturing and analyzing network traffic.
Unfurl is a URL analysis tool that extracts and visualizes data from URLs, breaking them down into components and presenting the information visually.
A userland implementation of the Network Block Device protocol that enables remote block device access over network connections for distributed storage and virtualization use cases.
A TCP-based traceroute implementation that bypasses firewall filters to trace the path to a destination.
A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.
A website scanner that provides a sandbox for the web, allowing users to scan URLs and websites for potential threats and vulnerabilities.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.