anti
ce2699455b
feat: DECNET-PROBER standalone JARM fingerprinting service
Add active TLS probing via JARM to identify C2 frameworks (Cobalt Strike,
Sliver, Metasploit) by their TLS server implementation quirks. Runs as a
detached host-level process — no container dependency.
- decnet/prober/jarm.py: pure-stdlib JARM implementation (10 crafted probes)
- decnet/prober/worker.py: standalone async worker with RFC 5424 + JSON output
- CLI: `decnet probe --targets ip:port` and `--probe-targets` on deploy
- Ingester: JARM bounty extraction (fingerprint type)
- 68 new tests covering JARM logic and bounty extraction
2026-04-14 12:14:32 -04:00
..
2026-04-14 02:14:46 -04:00
2026-04-14 02:14:46 -04:00
2026-04-13 07:39:01 -04:00
2026-04-13 07:39:01 -04:00
2026-04-13 07:39:01 -04:00
2026-04-14 12:14:32 -04:00
2026-04-14 00:57:38 -04:00
2026-04-14 12:14:32 -04:00
2026-04-03 18:56:25 -03:00
2026-04-11 19:51:41 -04:00
2026-04-14 12:14:32 -04:00
2026-04-11 03:32:11 -04:00
2026-04-13 07:39:01 -04:00
2026-04-04 04:08:27 -03:00
2026-04-09 01:33:15 -04:00
2026-04-12 07:48:17 -04:00
2026-04-13 01:43:52 -04:00
2026-04-13 01:43:52 -04:00
2026-04-13 01:43:52 -04:00
2026-04-09 01:33:15 -04:00
2026-04-10 16:41:23 -04:00