Multi-protocol passive fingerprinting library: TCP/HTTP (p0f-style) + TLS (JA4-style) analysis in Rust
-
Updated
Aug 2, 2025 - Rust
Multi-protocol passive fingerprinting library: TCP/HTTP (p0f-style) + TLS (JA4-style) analysis in Rust
p0f v3 with impersonation spoofing, written in Python - Accurately guess the OS of a packet with passive fingerprinting.
Fingerprinter is a simple remote os-fingerprinting and remote cloudprovider-detection tool. It uses the TTL-value of the IPv4-header to detect whether a Ubuntu or a Windows system is used. For the cloudprovider-detection (AWS or Azure) the corresponding lists of ip-address ranges are downloaded and searched if the targets ip address is in there.
p0f with Python.
CN-SEM 5
A machine learning approach to operating system fingerprinting through analysis of raw memory dumps and pointer graphs. This project is part of the T-710-MLCS (Machine Learning in Cybersecurity) course at Reykjavik University, Fall Semester, Cybersecurity Master's Degree program.
A lightweight Python tool for OS fingerprinting using TCP/IP header analysis. Detects likely operating systems by examining TTL, TCP window size, DF flag, and ToS from SYN-ACK responses. Ideal for network reconnaissance and educational use.
Network scanning toolset that performs subnet scanning, port scanning, and operating system fingerprinting.
definitely not at all similar to nmap
Add a description, image, and links to the os-fingerprinting topic page so that developers can more easily learn about it.
To associate your repository with the os-fingerprinting topic, visit your repo's landing page and select "manage topics."