Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
MUKI asset fingerprinting tool for red team reconnaissance. Use when performing authorized penetration testing, asset discovery, service fingerprinting, vuln...
MUKI asset fingerprinting tool for red team reconnaissance. Use when performing authorized penetration testing, asset discovery, service fingerprinting, vuln...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
MUKI is an active asset fingerprinting tool built for red team operations. It enables security researchers to rapidly pinpoint vulnerable systems from chaotic C-class segments and massive asset lists.
Linux amd64 system Network access to target systems Explicit written authorization for all target systems
# Scan single URL muki -u https://target.com # Scan multiple URLs from file muki -l targets.txt # Scan with proxy muki -u https://target.com -p socks5://127.0.0.1:1080 # Disable specific modules muki -u https://target.com -A -N # No active, no directory scan
-h, --help Show help -u, --url string Single URL to scan -l, --list string File containing URLs (one per line) -o, --output string Output file path -p, --proxy string Proxy server (http:// or socks5://) -t, --thread int Number of threads (default: 20, max: 100) -A, --no-active Disable active fingerprint scanning -N, --no-dir Disable directory scanning -x, --no-passive Disable passive fingerprint scanning
Sends protocol-specific probes to identify services with high confidence. 300+ active fingerprint rules Covers SSH, RDP, web servers, databases Protocol-specific probes
Analyzes response artifacts without additional traffic. 30,000+ precision fingerprints HTTP headers analysis TLS JA3 signatures HTML/CMS patterns WAF detection
Checks for high-risk paths using curated dictionaries. Admin interfaces (/admin, /manage) Config files (.env, config.php) Version control (/.git, /.svn) Vulnerability endpoints (Actuator, ThinkPHP routes) Backup files (.sql, .tar.gz)
Automatically extracts high-risk information from responses. Categories: Credentials: Passwords, API keys, JDBC strings Personal Data: Phone numbers, emails, ID cards Financial: Bank cards System Info: Internal IPs, versions Vulnerability Indicators: ID parameters, redirect URLs
{ "target": "https://example.com", "fingerprints": [ { "service": "Apache", "version": "2.4.41", "confidence": "high" } ], "sensitive_paths": [ { "path": "/admin", "status": 200, "risk": "high" } ], "sensitive_data": [ { "type": "email", "value": "admin@example.com", "source": "response body" } ] }
Structured .xlsx report with multiple sheets: Asset inventory Service fingerprints Sensitive paths Extracted data
# 1. Prepare target list cat > targets.txt << 'EOF' https://target1.com https://target2.com 192.168.1.0/24 EOF # 2. Run full scan muki -l targets.txt -o results.json # 3. Review results cat results.json | jq '.fingerprints[]' # 4. Generate Excel report muki -l targets.txt -o report.xlsx
# Use Tor proxy for anonymity muki -u https://target.com -p socks5://127.0.0.1:9050 # Or use HTTP proxy muki -u https://target.com -p http://127.0.0.1:8080
# Fast scan - only passive fingerprinting muki -u https://target.com -A -N # Deep scan - all modules muki -u https://target.com -t 50
Passive fingerprint database covering: Web frameworks (React, Vue, Django, Spring) Middleware (Apache, Nginx, IIS, Tomcat) CMS (WordPress, Drupal, Joomla) WAFs (Cloudflare, ModSecurity, AWS WAF) APIs (GraphQL, REST, SOAP) Known vulnerabilities (CVE signatures)
Active probing rules for: Web servers Databases (MySQL, PostgreSQL, MongoDB) Remote access (SSH, RDP, Telnet) Services (Redis, Elasticsearch, Docker)
Sensitive information extraction rules organized by groups: 疑似漏洞: ID parameters (SQLi indicators) 指纹信息: URL redirects, sensitive paths 敏感信息: Passwords, accounts, JDBC strings 基础信息: Emails, ID cards, phones, bank cards
Always obtain written authorization before scanning Define scope clearly (IPs, domains, time windows) Respect rate limits and business hours
Use proxies for external targets Adjust thread count to avoid detection Consider using -A -N for passive-only recon
Store results securely Encrypt sensitive findings Limit access to authorized personnel only Delete data after engagement ends
Cross-reference findings with manual verification Use multiple detection methods Check context of extracted sensitive data
WARNING: This tool is for authorized security testing only. Unauthorized scanning may violate laws (CFAA, Computer Misuse Act, etc.) Only use on systems you own or have explicit permission to test Extracting sensitive data without authorization is illegal Report findings responsibly through proper channels
# Chain with nuclei for vulnerability scanning cat muki_output.txt | nuclei -t cves/ # Import to Burp Suite cat results.json | jq -r '.sensitive_paths[].path' > burp_scope.txt # Feed to SQLMap for SQL injection testing cat results.json | jq -r '.vulnerable_params[]' | sqlmap -m -
Reduce thread count: -t 10 Scan in smaller batches Disable passive fingerprinting: -x
Verify findings manually Check rule specificity in Rules.yml Adjust confidence thresholds
Check proxy configuration Verify network connectivity Increase timeout values
Original Repository: https://github.com/yingfff123/MUKI Fingerprint Databases: See references/finger.json, active_finger.json Extraction Rules: See references/Rules.yml
MIT License - See original repository for details.
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.