Metadata-Version: 2.1
Name: hfinger
Version: 0.2.1
Summary: Hfinger - fingerprinting malware HTTP requests stored in pcap files
Home-page: https://github.com/CERT-Polska/hfinger
Author: Piotr Białczak
Author-email: piotrb@cert.pl
License: UNKNOWN
Description: 
        # Hfinger - fingerprinting malware HTTP requests
        
        Tool for fingerprinting malware HTTP requests. Based on Tshark and written in Python3. Working prototype stage :-)
        
        It's main objective is to provide a representation of malware requests in a shorter form than printing whole request, 
        but still human interpretable. This representation should be unique between malware families, 
        what means that any fingerprint should be seen only for one particular family.
        
        Project's website: [https://github.com/CERT-Polska/hfinger](https://github.com/CERT-Polska/hfinger).
        
Platform: UNKNOWN
Classifier: Development Status :: 3 - Alpha
Classifier: License :: OSI Approved :: GNU General Public License v3 (GPLv3)
Classifier: Programming Language :: Python :: 3
Requires-Python: >=3.3
Description-Content-Type: text/markdown
