Python binding for curl-impersonate via cffi. A http client that can impersonate browser tls/ja3/http2 fingerprints.
-
Updated
May 13, 2024 - Python
Python binding for curl-impersonate via cffi. A http client that can impersonate browser tls/ja3/http2 fingerprints.
Fixes Burp Suite's poor TLS stack. Bypass WAF, spoof any browser.
Scrapy download handler that can impersonate browser' TLS signatures or JA3 fingerprints.
A wireshark/tshark plugin for the JA3 TLS Client Fingerprinting Algorithm
Guardgress showcases a Web Application Firewall (WAF) integration within a Kubernetes Ingress Controller.
user friendly wrapper for pycurl
A pure-JS module to read TLS client hello data and calculate TLS fingerprints from an incoming socket connection.
🐾 A simple web app for inspecting TLS / HTTP/2 fingerprints
.NET client for https://github.com/Danny-Dasilva/CycleTLS to spoof TLS/JA3 fingerprints
HTTP proxy with per-request uTLS fingerprint mimicry and upstream proxy tunneling. Currently WIP.
A caddy plugin that gets JA3 TLS fingerprints from requests.
HTTP client that can impersonate web browsers (Chrome/Edge/OkHttp/Safari), mimicking their headers and TLS/JA3/JA4/HTTP2 fingerprints
ClientHello Reflection service in Go designed for tlsfingerprint.io
In this repository we will catch some fields on TLS traffic, and use Threat Intel to detect if the packets received
a project aims at anti-fingerprinting programming
OpenSSL (legacy branch OpenSSL_1_1_1) patchset to remove broken/weak cipher, remove version leaks and reorder cipher and kex algos
Some of the school assignments from my master's degree study.
Add a description, image, and links to the tls-fingerprint topic page so that developers can more easily learn about it.
To associate your repository with the tls-fingerprint topic, visit your repo's landing page and select "manage topics."