Skip to main content

Hfinger - fingerprinting malware HTTP requests stored in pcap files

Project description

Hfinger - fingerprinting malware HTTP requests

Tool for fingerprinting malware HTTP requests. Based on Tshark and written in Python3. Working prototype stage :-)

It's main objective is to provide a representation of malware requests in a shorter form than printing whole request, but still human interpretable. This representation should be unique between malware families, what means that any fingerprint should be seen only for one particular family.

Project's website: https://github.com/CERT-Polska/hfinger.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

hfinger-0.2.2-py3-none-any.whl (30.2 kB view details)

Uploaded Python 3

File details

Details for the file hfinger-0.2.2-py3-none-any.whl.

File metadata

  • Download URL: hfinger-0.2.2-py3-none-any.whl
  • Upload date:
  • Size: 30.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.1 CPython/3.11.3

File hashes

Hashes for hfinger-0.2.2-py3-none-any.whl
Algorithm Hash digest
SHA256 6e414a956e0bb8c68dc3dd47dd8be60cf1d7404a81b5a1336588acfd636853aa
MD5 9800f9d040de5fc7af353fe1f7dfee5c
BLAKE2b-256 0a222b08a689424b734bb63bfa432c7cdf691b176f2f5f87323eeed359358bbd

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page