Multi-protocol passive fingerprinting library: TCP/HTTP (p0f-style) + TLS (JA4-style) analysis in Rust
-
Updated
Dec 13, 2025 - Rust
Multi-protocol passive fingerprinting library: TCP/HTTP (p0f-style) + TLS (JA4-style) analysis in Rust
p0f v3 with impersonation spoofing, written in Python - Accurately guess the OS of a packet with passive fingerprinting.
Fingerprinter is a simple remote os-fingerprinting and remote cloudprovider-detection tool. It uses the TTL-value of the IPv4-header to detect whether a Ubuntu or a Windows system is used. For the cloudprovider-detection (AWS or Azure) the corresponding lists of ip-address ranges are downloaded and searched if the targets ip address is in there.
[ProRT-IP] Protocol / Port Real-Time War Scanner for IP Networks — fast OS fingerprinting, service detection, and stealth networking features ... “Fast. Stealthy. Rust.”
p0f with Python.
A lightweight Python tool for OS fingerprinting using TCP/IP header analysis. Detects likely operating systems by examining TTL, TCP window size, DF flag, and ToS from SYN-ACK responses. Ideal for network reconnaissance and educational use.
CN-SEM 5
definitely not at all similar to nmap
A machine learning approach to operating system fingerprinting through analysis of raw memory dumps and pointer graphs. This project is part of the T-710-MLCS (Machine Learning in Cybersecurity) course at Reykjavik University, Fall Semester, Cybersecurity Master's Degree program.
Network utility for host discovery and port enumeration
ThreatSight is an advanced Python-based network scanning tool that automates security assessments by combining Nmap's powerful scanning engine with automated vulnerability correlation and risk prioritization. Designed for security teams and network administrators, it transforms raw scan data into actionable security insights.
Network scanning toolset that performs subnet scanning, port scanning, and operating system fingerprinting.
Add a description, image, and links to the os-fingerprinting topic page so that developers can more easily learn about it.
To associate your repository with the os-fingerprinting topic, visit your repo's landing page and select "manage topics."