Skip to content

Muki is an active asset fingerprinting tool built for red teams — powered by 30,000+ precision signatures, proxy rotation, and intelligent deduplication to rapidly surface high-value targets from chaotic C-class networks, delivering structured Excel/JSON reports that turn reconnaissance from guesswork into surgical precision.

License

Notifications You must be signed in to change notification settings

yingfff123/MUKI

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

66 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

A fingerprinting tool

Muki - Active Asset Fingerprinting Tool

Muki is a brand-new active asset fingerprinting tool designed for red team operations. During reconnaissance, Muki enables security researchers to rapidly pinpoint vulnerable systems from chaotic C-class segments and massive asset lists, enabling targeted exploitation.


  • Smart Deduplication: URL normalization–based deduplication for higher scan efficiency
  • Multi-format Export: Results exported in Excel (.xlsx) and JSON
  • Key Asset Extraction: Auto-identifies and highlights high-value targets
  • Thread Control: Adjust concurrency with -T for optimal speed/stability
  • Reduced False Positives: Refined matching logic (e.g., fixed GeoServer FPs)
  • 30,000+ Precision Fingerprints: Covers mainstream frameworks, middleware, APIs, and known vulnerabilities
  • 200+ Active Fingerprint Rules: Targeted probes for accurate service detection

Release 2.02

command-line options:

-h, --help help for Muki

-l, --list string file containing multiple URLs to scan (one per line)

-A, --no-active disable active fingerprint scanning

-N, --no-dir disable directory scanning

-x, --no-passive disable passive fingerprint scanning

-o, --output string output file path

-p, --proxy string specify proxy server, e.g. http://127.0.0.1:8080 or socks5://127.0.0.1:1080

-t, --thread int number of threads (default: CPU cores × 3, min 8, max 100) (default 20)

-u, --url string URL to scan

Introduction

whiteboard_exported_image

The tool performs systematic reconnaissance through a four-stage pipeline: asset ingestion → parallel probing → data aggregation → structured reporting.

Asset Ingestion Targets (IPs, domains, URLs) are loaded from an external list, defining scan scope and ensuring reproducibility.

Parallel Probing Modules Three independent modules run concurrently:

Active Fingerprinting: Sends protocol-specific probes to identify services (e.g., SSH, RDP, web servers) with high confidence.
Passive Fingerprinting: Analyzes response artifacts (HTTP headers, TLS JA3, HTML patterns) to infer frameworks, WAFs, or CMS without additional traffic.
Sensitive Path Detection: Checks for high-risk paths—including admin interfaces (e.g., /admin), config files (e.g., .env), version control dirs (e.g., /.git), and known vulnerability endpoints (e.g., Spring Boot Actuator, ThinkPHP routes)—using curated dictionaries and response validation.

Each module can be disabled via command-line flags (-A, -x, -N) for operational flexibility.

Data Aggregation Raw results are normalized, deduplicated, correlated (e.g., paths linked to hosts), and optionally enriched with vulnerability intelligence.

Report Generation Outputs machine-readable reports (JSON/XLSX/) containing:

Asset inventory
Service fingerprints (active/passive)
Confirmed sensitive paths with HTTP status codes
Actionable risk indicators

Designed for red team operations, attack surface mapping, and security validation—prioritizing precision, coverage, and integration readiness.

About

Muki is an active asset fingerprinting tool built for red teams — powered by 30,000+ precision signatures, proxy rotation, and intelligent deduplication to rapidly surface high-value targets from chaotic C-class networks, delivering structured Excel/JSON reports that turn reconnaissance from guesswork into surgical precision.

Resources

License

Stars

Watchers

Forks

Packages

No packages published