15 skills found
lexiforest / Curl CffiPython binding for curl-impersonate fork via cffi. A http client that can impersonate browser tls/ja3/http2 fingerprints.
sardanioss / HttpcloakGo HTTP client with browser-identical TLS/HTTP2 fingerprinting. Bypass bot detection by perfectly mimicking Chrome, Firefox, and Safari at the cryptographic level (JA3/JA4, Akamai fingerprint, header order). Supports HTTP/1.1, HTTP/2, HTTP/3, sessions, cookies, and proxies.
Noooste / Azuretls ClientAn easy-to-use HTTP client to spoof TLS/JA3, HTTP2 and HTTP3 fingerprint
wi1dcard / FingerproxyFingerproxy is an HTTPS reverse proxy. It creates JA3, JA4, Akamai HTTP2 fingerprints, and forwards to backend via HTTP request headers.
phuslu / Nginx Ssl FingerprintHigh performance ja3 and http2 fingerprint for nginx.
arman-bd / Httpmorphhttpmorph is a drop-in replacement for Python's requests library that uses a custom C implementation with BoringSSL instead of Python's standard HTTP stack.
gospider007 / Fp🚀obtain the client's ja3 fingerprint, http2 fingerprint, and ja4 fingerprint
0x676e67 / Rquest DeprecatedAn fast asynchronous Rust HTTP/WebSocket Client with TLS/JA3/JA4/HTTP2 fingerprint impersonate
SearchApi / Wreq RubyRuby bindings for wreq, an HTTP client with TLS/HTTP2 browser fingerprinting
biandratti / Huginn ProxyHigh-performance reverse proxy that forwards the client TLS (JA4), HTTP/2 (Akamai) and TCP SYN (p0f via eBPF/XDP) signatures as headers to backend via HTTP for bot detection and traffic analysis
ben-sb / H2fpServer to compute and inspect http2 network fingerprints
StopMakingThatBigFace / Node WreqTypescript browser fingerprint bypass library using Rust for native TLS/HTTP2 impersonation
Noooste / Azuretls ApiA ready-to-use request forwarding service to spoof TLS/JA3, HTTP2 and HTTP3 fingerprint
jaredboynton / SpecterHTTP client with full TLS/HTTP2 fingerprint control
AlpacaTunnel / Alpaca Http2A SOCKS5 proxy over HTTP2, with the TLS fingerprint of any web browser and Nginx server.