Hfinger - fingerprinting malware HTTP requests stored in pcap files
Project description
Hfinger - fingerprinting malware HTTP requests
Tool for fingerprinting malware HTTP requests. Based on Tshark and written in Python3. Working prototype stage :-)
It's main objective is to provide a representation of malware requests in a shorter form than printing whole request, but still human interpretable. This representation should be unique between malware families, what means that any fingerprint should be seen only for one particular family.
Project's website: https://github.com/CERT-Polska/hfinger.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distributions
No source distribution files available for this release.See tutorial on generating distribution archives.
Built Distribution
hfinger-0.2.2-py3-none-any.whl
(30.2 kB
view details)
File details
Details for the file hfinger-0.2.2-py3-none-any.whl
.
File metadata
- Download URL: hfinger-0.2.2-py3-none-any.whl
- Upload date:
- Size: 30.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.1 CPython/3.11.3
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 6e414a956e0bb8c68dc3dd47dd8be60cf1d7404a81b5a1336588acfd636853aa |
|
MD5 | 9800f9d040de5fc7af353fe1f7dfee5c |
|
BLAKE2b-256 | 0a222b08a689424b734bb63bfa432c7cdf691b176f2f5f87323eeed359358bbd |