Multi-protocol passive fingerprinting library: TCP/HTTP (p0f-style) + TLS (JA4-style) analysis in Rust
-
Updated
Feb 24, 2026 - Rust
Multi-protocol passive fingerprinting library: TCP/HTTP (p0f-style) + TLS (JA4-style) analysis in Rust
p0f v3 with impersonation spoofing, written in Python - Accurately guess the OS of a packet with passive fingerprinting.
Network Tools
Purely passive OS and application fingerprinting system
modernized and C99 compliant port of p0f (Passive OS fingerprinting)
Passive reverse proxy that silently fingerprints every client connection — TLS (JA4), HTTP/2 (Akamai) and TCP SYN (p0f via eBPF/XDP) — and forwards signatures as headers for bot detection and traffic analysis.
Floodspark Counterespionage Firewall (CEF) helps you record and block or honeypot reconnaissance or otherwise illegitimate traffic. CEF is like a web application firewall (WAF) but protects against reconnaissance.
TCP Fingerprinting of email senders.
p0f with Python.
🔍 PASSIVE OS FINGERPRINTING. Python p0f implementation. Detect hosts. Reveal OS without touching. 🕵️
Passive OS fingerprinting support for rspamd
Detecting Network Address Translation & Proxy Use
Add a description, image, and links to the p0f topic page so that developers can more easily learn about it.
To associate your repository with the p0f topic, visit your repo's landing page and select "manage topics."