JA3 Logo

JA3

0
Free
Visit Website

JA3 is a method for creating SSL/TLS client fingerprints that can be easily shared for threat intelligence. It was invented at Salesforce in 2017 but is now maintained by John Althouse at FoxIO-LLC. The project includes JA3 and JA3S scripts for Zeek and Python, with support added to various cybersecurity tools and platforms.

FEATURES

ALTERNATIVES

A tool for discovering and enumerating external attack surfaces

Sniffglue is a network sniffer tool written in Rust with advanced filter sensitivity options and secure packet processing.

WiGLE.net is a platform that collects and provides data on WiFi networks and cell towers, with over 1.3 billion networks collected.

SentryPeer is a fraud detection tool that monitors and detects fraudulent activities on SIP servers, capturing IP addresses and phone numbers of suspicious activities and providing a notification system to service providers.

Arkime is an open-source network capture and analysis tool that provides comprehensive network visibility, facilitating swift identification and resolution of security and network issues.

A foundational guide for using deception against computer network adversaries using honeypots to detect adversaries before they accomplish their goals.

A wireless network detector, sniffer, and intrusion detection system

A low-interaction SSH honeypot written in C