Multi-protocol passive fingerprinting library: TCP/HTTP (p0f-style) + TLS (JA4-style) analysis in Rust
-
Updated
Feb 24, 2026 - Rust
Multi-protocol passive fingerprinting library: TCP/HTTP (p0f-style) + TLS (JA4-style) analysis in Rust
p0f v3 with impersonation spoofing, written in Python - Accurately guess the OS of a packet with passive fingerprinting.
Network Tools
Purely passive OS and application fingerprinting system
modernized and C99 compliant port of p0f (Passive OS fingerprinting)
High-performance reverse proxy that forwards the client TLS (JA4), HTTP/2 (Akamai) and TCP SYN (p0f via eBPF/XDP) signatures as headers to backend via HTTP for bot detection and traffic analysis
TCP Fingerprinting of email senders.
Floodspark Counterespionage Firewall (CEF) helps you record and block or honeypot reconnaissance or otherwise illegitimate traffic. CEF is like a web application firewall (WAF) but protects against reconnaissance.
p0f with Python.
🔍 PASSIVE OS FINGERPRINTING. Python p0f implementation. Detect hosts. Reveal OS without touching. 🕵️
Passive OS fingerprinting support for rspamd
Detecting Network Address Translation & Proxy Use
Add a description, image, and links to the p0f topic page so that developers can more easily learn about it.
To associate your repository with the p0f topic, visit your repo's landing page and select "manage topics."