agirishkumar / passive-os-detectionLinks
Passive OS fingerprinting using TCP/IP
☆19Updated 6 years ago
Alternatives and similar repositories for passive-os-detection
Users that are interested in passive-os-detection are comparing it to the libraries listed below
Sorting:
- Fork of Go stdlib's net/http that works with alternative TLS libraries like refraction-networking/utls.☆74Updated 11 months ago
- Passive TCP/IP Fingerprinting Tool. Run this on your server and find out what Operating Systems your clients are *really* using.☆396Updated 2 months ago
- Fingerproxy is an HTTPS reverse proxy. It creates JA3, JA4, Akamai HTTP2 fingerprints, and forwards to backend via HTTP request headers.☆292Updated 8 months ago
- Beat Akamai Technologies' State of the Art Antibot 2.0☆74Updated 2 weeks ago
- The working base of a module injector/patcher for the software Charles☆25Updated 4 years ago
- ☆33Updated 3 years ago
- OSfooler-ng prevents remote active/passive OS fingerprinting by tools like nmap or p0f☆32Updated 2 years ago
- Automatically extract modules compiled with webpack☆27Updated 4 years ago
- Reverse proxy server to filter traffic based on JA3 fingerprint/hash☆26Updated 2 years ago
- ☆22Updated 3 years ago
- Drop in HTTP client that allows for spoofing TLS fingerprint with uTLS and adds support for proxying TLS connections.☆100Updated 4 years ago
- ☆29Updated last year
- 🚀obtain the client's ja3 fingerprint, http2 fingerprint, and ja4 fingerprint☆110Updated 3 weeks ago
- A Node.js module for decrypting and encrypting Akamai v3 sensor data.☆42Updated 9 months ago
- web fingerprinting research☆246Updated 2 years ago
- Impersonating JA3 signatures☆398Updated last year
- GHIDRA plugin to parse, disassemble and decompile NodeJS Bytenode (JSC) binaries☆17Updated 4 years ago
- Automation of the javascript deobfuscation process☆25Updated 2 weeks ago
- Scope VM: Javascript Virtual Machine☆40Updated 7 years ago
- golang http proxy with ja3 support☆35Updated 7 months ago
- IlluminateJS is a static JavaScript deobfuscator☆157Updated 3 years ago
- tls.peet.ws / tls3.peet.ws (http3)☆373Updated last week
- Mimic chromium's HTTP/HTTP2 and TLS implementations.☆106Updated 6 months ago
- Protocol-only geetest slider cracker. Average time gen token less 3 seconds☆15Updated 4 years ago
- A browser to counter advanced fingerprinting techniques☆59Updated 5 years ago
- Fork of https://gitlab.com/yawning/utls for github. It can be used in Go without issues parsing go.mod☆21Updated 3 weeks ago
- sensor-android akamai sensor mock☆13Updated 5 years ago
- A proof of concept of JA3 tracking.☆29Updated 7 years ago
- This project shows how the W3C EME API can be used to perform fingerprinting of devices using the Widevine DRM system.☆38Updated last year
- Google Chrome release and version info as JSON (self updating)☆59Updated this week