juzeon / spoofed-round-tripper
A Go's http.RoundTripper implementation that provides a wrapper for tls-client and leverages uTLS to spoof TLS fingerprints (JA3, JA4, HTTP/2 Akamai, etc) of mainstream browsers for use in different HTTP client libraries (like resty) to bypass Cloudflare or other firewalls.
☆28Updated 8 months ago
Related projects: ⓘ
- 🚀A next-generation HTTP client for Golang, Support ja3, ja4, http2, tls fingerprint modification☆101Updated last week
- 🚀obtain the client's ja3 fingerprint, http2 fingerprint, and ja4 fingerprint☆64Updated 3 months ago
- Fingerproxy is an HTTPS reverse proxy. It creates JA3, JA4, Akamai HTTP2 fingerprints, and forwards to backend via HTTP request headers.☆85Updated 2 weeks ago
- Customizing TLS (JA3) Fingerprints through HTTP Proxy☆94Updated 2 months ago
- golang http proxy with ja3 support☆29Updated 10 months ago
- fork of fhttp with fixed window_update and removal of gzip/flate/brotli decoding☆26Updated 3 months ago
- ☆213Updated 2 months ago
- An easy-to-use HTTP client 100% in Go to spoof TLS/JA3 and HTTP2 fingerprint☆162Updated last week
- Mimic chromium's HTTP/HTTP2 and TLS implementations.☆78Updated 8 months ago
- Simple go module to bypass CloudFlare securities☆22Updated 7 months ago
- anti-bot-detection with rod☆241Updated 5 months ago
- Introduction to JA3 Fingerprint and how to impersonate it.☆50Updated 4 years ago
- Chromedp undetected☆65Updated 5 months ago
- Impersonating JA3 signatures