Is there an existing issue for this?
Describe the solution you'd like
Can you please implement JA4 TLS fingerprinting as it would significantly enhance Sniffnet’s ability to analyze encrypted traffic by exposing behavioral patterns in TLS handshakes even when payloads are encrypted.
This is an existing project that could be used to generate the fingerprints:
https://github.com/biandratti/huginn-net
JSON list of known fingerprints:
curl -s "https://ja4db.com/api/read/" | jq '[.[] | select(.application != null)]'
Main JA4 repository:
https://github.com/FoxIO-LLC/ja4
Is your feature request related to a problem?
No response
Is there an existing issue for this?
Describe the solution you'd like
Can you please implement JA4 TLS fingerprinting as it would significantly enhance Sniffnet’s ability to analyze encrypted traffic by exposing behavioral patterns in TLS handshakes even when payloads are encrypted.
This is an existing project that could be used to generate the fingerprints:
https://github.com/biandratti/huginn-net
JSON list of known fingerprints:
curl -s "https://ja4db.com/api/read/" | jq '[.[] | select(.application != null)]'Main JA4 repository:
https://github.com/FoxIO-LLC/ja4
Is your feature request related to a problem?
No response