SkillAgentSearch skills...

MUKI

Muki is an active asset fingerprinting tool built for red teams — powered by 30,000+ precision signatures, proxy rotation, and intelligent deduplication to rapidly surface high-value targets from chaotic C-class networks, delivering structured Excel/JSON reports that turn reconnaissance from guesswork into surgical precision.

Install / Use

/learn @yingfff123/MUKI
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

<p> <strong>A fingerprinting tool</strong> </p> <p align="center"> <a href="https://github.com/yourusername/muki/blob/main/LICENSE"><img src="https://img.shields.io/badge/license-MIT-blue.svg"></a> <a href="https://github.com/yourusername/muki/releases"><img src="https://img.shields.io/github/v/release/yourusername/muki"></a> <a href="https://golang.org/"><img src="https://img.shields.io/badge/language-Go-blue.svg"></a> </p> </p> <p align="center"> <img width="324" height="120" alt="Muki - Active Asset Fingerprinting Tool" src="https://github.com/user-attachments/assets/fd331a9e-7628-462e-9189-3eb8387323c6" /> </p> <p align="center"> Muki is a brand-new active asset fingerprinting tool designed for red team operations. During reconnaissance, Muki enables security researchers to rapidly pinpoint vulnerable systems from chaotic C-class segments and massive asset lists, enabling targeted exploitation.
  • Smart Deduplication: URL normalization–based deduplication for higher scan efficiency
  • Multi-format Export: Results exported in Excel (.xlsx) and JSON
  • Key Asset Extraction: Auto-identifies and highlights high-value targets
  • Thread Control: Adjust concurrency with -T for optimal speed/stability
  • Reduced False Positives: Refined matching logic (e.g., fixed GeoServer FPs)
  • 30,000+ Precision Fingerprints: Covers mainstream frameworks, middleware, APIs, and known vulnerabilities
  • 300+ Active Fingerprint Rules: Targeted probes for accurate service detection
  • Passive Sensitive Data Extraction: Automatically extracts high-risk information (e.g., phone numbers, email addresses, API keys, and credentials) from response content without active probing Release 2.1.1

command-line options:

-h, --help help for Muki

-l, --list string file containing multiple URLs to scan (one per line)

-A, --no-active disable active fingerprint scanning

-N, --no-dir disable directory scanning

-x, --no-passive disable passive fingerprint scanning

-o, --output string output file path

-p, --proxy string specify proxy server, e.g. http://127.0.0.1:8080 or socks5://127.0.0.1:1080

-t, --thread int number of threads (default: CPU cores × 3, min 8, max 100) (default 20)

-u, --url string URL to scan

Introduction

<img width="1034" height="1852" alt="whiteboard_exported_image" src="https://github.com/user-attachments/assets/24276d29-e1d3-489e-9f54-5c4e6877ee64" />

The tool performs systematic reconnaissance through a four-stage pipeline: asset ingestion → parallel probing → data aggregation → structured reporting.

Asset Ingestion Targets (IPs, domains, URLs) are loaded from an external list, defining scan scope and ensuring reproducibility.

Parallel Probing Modules Three independent modules run concurrently:

Active Fingerprinting: Sends protocol-specific probes to identify services (e.g., SSH, RDP, web servers) with high confidence.
Passive Fingerprinting: Analyzes response artifacts (HTTP headers, TLS JA3, HTML patterns) to infer frameworks, WAFs, or CMS without additional traffic.
Sensitive Path Detection: Checks for high-risk paths—including admin interfaces (e.g., /admin), config files (e.g., .env), version control dirs (e.g., /.git), and known vulnerability endpoints (e.g., Spring Boot Actuator, ThinkPHP routes)—using curated dictionaries and response validation.

Each module can be disabled via command-line flags (-A, -x, -N) for operational flexibility.

Data Aggregation Raw results are normalized, deduplicated, correlated (e.g., paths linked to hosts), and optionally enriched with vulnerability intelligence.

Report Generation Outputs machine-readable reports (JSON/XLSX/) containing:

Asset inventory
Service fingerprints (active/passive)
Confirmed sensitive paths with HTTP status codes
Actionable risk indicators

Designed for red team operations, attack surface mapping, and security validation—prioritizing precision, coverage, and integration readiness.

Sensitive Information Identification Feature: Extract sensitive information from the response packets of all traffic.

<img width="1046" height="558" alt="image" src="https://github.com/user-attachments/assets/b6b06ae2-ed61-4791-bdde-a42413edfb61" />

Related Skills

View on GitHub
GitHub Stars110
CategoryDevelopment
Updated16h ago
Forks9

Security Score

95/100

Audited on Mar 30, 2026

No findings