Multi-protocol passive fingerprinting library: TCP/HTTP (p0f-style) + TLS (JA4-style) analysis in Rust
-
Updated
Sep 20, 2025 - Rust
Multi-protocol passive fingerprinting library: TCP/HTTP (p0f-style) + TLS (JA4-style) analysis in Rust
p0f v3 with impersonation spoofing, written in Python - Accurately guess the OS of a packet with passive fingerprinting.
Fingerprinter is a simple remote os-fingerprinting and remote cloudprovider-detection tool. It uses the TTL-value of the IPv4-header to detect whether a Ubuntu or a Windows system is used. For the cloudprovider-detection (AWS or Azure) the corresponding lists of ip-address ranges are downloaded and searched if the targets ip address is in there.
p0f with Python.
CN-SEM 5
A lightweight Python tool for OS fingerprinting using TCP/IP header analysis. Detects likely operating systems by examining TTL, TCP window size, DF flag, and ToS from SYN-ACK responses. Ideal for network reconnaissance and educational use.
Network scanning toolset that performs subnet scanning, port scanning, and operating system fingerprinting.
definitely not at all similar to nmap
ThreatSight is an advanced Python-based network scanning tool that automates security assessments by combining Nmap's powerful scanning engine with automated vulnerability correlation and risk prioritization. Designed for security teams and network administrators, it transforms raw scan data into actionable security insights.
A machine learning approach to operating system fingerprinting through analysis of raw memory dumps and pointer graphs. This project is part of the T-710-MLCS (Machine Learning in Cybersecurity) course at Reykjavik University, Fall Semester, Cybersecurity Master's Degree program.
Add a description, image, and links to the os-fingerprinting topic page so that developers can more easily learn about it.
To associate your repository with the os-fingerprinting topic, visit your repo's landing page and select "manage topics."