sundruid / muonfpView external linksLinks
MuonFP is an enterprise ready, TCP passive fingerprinter written in Rust that has no external dependencies such as WireShark or other open source software.
☆29Dec 12, 2025Updated 2 months ago
Alternatives and similar repositories for muonfp
Users that are interested in muonfp are comparing it to the libraries listed below
Sorting:
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- first commit☆20Sep 12, 2025Updated 5 months ago
- Object detection at the edge, with Google's Coral dev board☆24Jan 23, 2023Updated 3 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Mar 9, 2022Updated 3 years ago
- Use SQL to instantly query host, DNS and exploit information using Shodan. Open source CLI. No DB required.☆29Updated this week
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Universal Honey Pot☆29Aug 27, 2025Updated 5 months ago
- ANAF XML-to-PDF converter☆10Mar 5, 2024Updated last year
- 🕵🏽 macOS Big Sur desktop app to monitor active TCP connections through the lens of GreyNoise☆33Jun 11, 2022Updated 3 years ago
- Pong, the operating system version☆36Mar 6, 2019Updated 6 years ago
- 🦉 Agent for Flock, the privacy-preserving fleet management system☆32May 1, 2020Updated 5 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- ☆46Feb 6, 2026Updated last week
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- Python wrapper for http://nacl.cace-project.eu/☆30Nov 8, 2021Updated 4 years ago
- Self service portal for aws workspace☆10Dec 10, 2023Updated 2 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.☆11Apr 27, 2023Updated 2 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- Cyber Underground General Intelligence Requirements☆97Feb 2, 2024Updated 2 years ago
- Signature based honeypot detector tool written in Golang☆108Mar 22, 2025Updated 10 months ago
- ☆47Oct 4, 2023Updated 2 years ago
- ☆37Jul 10, 2015Updated 10 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- Upload SQLite database files to Datasette☆14Nov 10, 2025Updated 3 months ago
- Work to track the comparison of COVID Tracking Project data to the CDC COVID tracker data.☆11Jun 15, 2020Updated 5 years ago
- ☆21Dec 4, 2014Updated 11 years ago
- Random one-offs that need a temporary home☆12Jan 28, 2026Updated 2 weeks ago
- A Security Analysis of Honeywords☆15Nov 28, 2017Updated 8 years ago
- Tools for WD My Cloud Home☆11Jun 21, 2020Updated 5 years ago
- Decoder and encoder for Base64 (MIME), uuencoded, xxencoded and Binhex files.☆11Mar 20, 2025Updated 10 months ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- A Linux/GNU systems programming library in C.☆10Feb 7, 2026Updated last week
- A password list optimized for use on Android devices.☆11Jul 2, 2022Updated 3 years ago
- ramcache implements an in-memory key/value cache with expirations based on access and insertion times.☆13Aug 7, 2018Updated 7 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Hey, Elon Chrome Extension☆12Nov 9, 2022Updated 3 years ago