p0f v3 with impersonation spoofing, written in Python - Accurately guess the OS of a packet with passive fingerprinting.
-
Updated
May 11, 2024 - Python
p0f v3 with impersonation spoofing, written in Python - Accurately guess the OS of a packet with passive fingerprinting.
A Rust library for passive traffic fingerprinting [p0f]
Fingerprinter is a simple remote os-fingerprinting and remote cloudprovider-detection tool. It uses the TTL-value of the IPv4-header to detect whether a Ubuntu or a Windows system is used. For the cloudprovider-detection (AWS or Azure) the corresponding lists of ip-address ranges are downloaded and searched if the targets ip address is in there.
p0f with Python.
CN-SEM 5
A machine learning approach to operating system fingerprinting through analysis of raw memory dumps and pointer graphs. This project is part of the T-710-MLCS (Machine Learning in Cybersecurity) course at Reykjavik University, Fall Semester, Cybersecurity Master's Degree program.
Network scanning toolset that performs subnet scanning, port scanning, and operating system fingerprinting.
definitely not at all similar to nmap
Add a description, image, and links to the os-fingerprinting topic page so that developers can more easily learn about it.
To associate your repository with the os-fingerprinting topic, visit your repo's landing page and select "manage topics."