MuonFP is an enterprise ready, TCP passive fingerprinter written in Rust that has no external dependencies such as WireShark or other open source software.
☆29Mar 27, 2026Updated this week
Alternatives and similar repositories for muonfp
Users that are interested in muonfp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AI-powered phishing & threat-analysis platform to automatically inspect, classify, and report suspicious emails, files, URLs, IPs, and ha…☆79Updated this week
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Outil de triage automatisé de différents types de collectes d'artefacts.☆18Dec 8, 2025Updated 3 months ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Universal Honey Pot☆29Aug 27, 2025Updated 7 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 10 years ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 10 months ago
- IOC/Hash scanner and IDS layer 4 designed to be portable and fast☆27Jan 28, 2026Updated 2 months ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Mar 9, 2022Updated 4 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 3 years ago
- Signature based honeypot detector tool written in Golang☆110Mar 22, 2025Updated last year
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆292Dec 6, 2025Updated 3 months ago
- An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.☆86Mar 14, 2026Updated 2 weeks ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆17Mar 13, 2026Updated 2 weeks ago
- Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.☆11Apr 27, 2023Updated 2 years ago
- Object detection at the edge, with Google's Coral dev board☆24Jan 23, 2023Updated 3 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- first commit☆24Feb 16, 2026Updated last month
- A running list of Windows sources and the related event ids.☆19Aug 2, 2023Updated 2 years ago
- medium interaction postgresql honeypot☆12Aug 6, 2024Updated last year
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆44Mar 9, 2026Updated 2 weeks ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A web application for generating, parsing and validating, manipulating, visualizing and executing CACAO v2.0 playbooks.☆39Aug 27, 2025Updated 7 months ago
- ☆21Dec 4, 2014Updated 11 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- OASIS TC Open Repository: A GitHub public repository for development of a python library to transform between data-interchange formats (s…☆14Feb 10, 2022Updated 4 years ago
- This repository contains sample code that demonstrates different ways to use the AWS IAM Access Analyzer APIs.☆25Mar 18, 2022Updated 4 years ago
- A Dissect module implementing a parser for Microsofts Extensible Storage Engine Database (ESEDB), used for example in Active Directory, E…☆25Nov 20, 2025Updated 4 months ago
- Demo showing Claude Opus does not find CVE-2023-0266☆17Mar 19, 2024Updated 2 years ago
- ANAF XML-to-PDF converter☆10Mar 5, 2024Updated 2 years ago
- ☆16May 15, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- grep for context, not just text. Local-first CLI for searching documents, notes, memories, and project context.☆23Mar 8, 2026Updated 3 weeks ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆25May 5, 2017Updated 8 years ago
- ☆37Jul 10, 2015Updated 10 years ago
- Run remote system commands from Oracle connection - oracle exec command perl☆12Jun 6, 2015Updated 10 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago