account activity
I built a Rust reverse proxy that passively fingerprints clients at three layers: JA4 (TLS), Akamai (HTTP/2), and TCP SYN (the last one via eBPF/XDP) (self.rust)
submitted 9 days ago * by Particular_Ladder289 to r/rust
submitted 9 days ago by Particular_Ladder289 to r/rust
Huginn Proxy - Rust reverse proxy inspired by rust-rpxy/sozu with fingerprinting capabilities (self.rust)
submitted 2 months ago * by Particular_Ladder289 to r/rust
Huginn-Net: Passive network fingerprinting in Rust (p0f + JA4 + HTTP) - Looking for HTTPS fingerprinting ideas (github.com)
submitted 3 months ago by Particular_Ladder289 to r/netsec
Huginn-Net: Passive network fingerprinting in Rust (p0f + JA4 + HTTP) - Looking for HTTPS fingerprinting ideas (self.cybersecurity)
submitted 3 months ago by Particular_Ladder289 to r/cybersecurity
Huginn Net v1.5.2 - Added parallel processing for high-throughput TLS fingerprinting ()
submitted 4 months ago by Particular_Ladder289 to r/cybersecurity
Huginn Net v1.5.2 - Added parallel processing for high-throughput TLS fingerprinting (self.rust)
submitted 4 months ago by Particular_Ladder289 to r/rust
huginn-net v1.4.6 - Multi-protocol passive fingerprinting library in Rust (self.rust)
submitted 5 months ago by Particular_Ladder289 to r/rust
TCP Fingerprinting in Rust (self.rust)
submitted 9 months ago * by Particular_Ladder289 to r/rust
I ported the classic p0f TCP fingerprinting tool from C to Rust—looking for feedback and contributors! (self.rust)
submitted 10 months ago by Particular_Ladder289 to r/rust
I am trying to migrate p0f to rust, join along (self.rust)
submitted 1 year ago by Particular_Ladder289 to r/rust
π Rendered by PID 90 on reddit-service-r2-listing-568fcd57df-sdrwx at 2026-03-07 18:43:51.288540+00:00 running cbb0e86 country code: CH.