
A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.
A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.
The SSL Blacklist (SSLBL) is a project of abuse.ch that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers. It also identifies JA3 fingerprints to detect and block malware botnet C&C communication on the TCP layer. The platform provides a list of malicious SSL certificates, JA3 fingerprints, and statistics on botnet C&C operations that leverage SSL to encrypt botnet C&C traffic. The platform offers several features, including: * Identifying botnet command and control (C&C) infrastructure * Detecting botnet C&C communication * Providing insights into botnet C&C operations that leverage SSL to encrypt botnet C&C traffic
Common questions about SSLBL - SSL Blacklist including features, pricing, alternatives, and user reviews.
SSLBL - SSL Blacklist is A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication. It is a Threat Management solution designed to help security teams with C2, SSL, Botnet.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Hale is a modular botnet command and control monitoring tool that tracks C&C server communications across multiple protocols with web-based analysis interface and collaborative research capabilities.