-
**Describe the feature:**
During the navigation in the Network tab for IP details, when looking into TLS/SSL information the data is returned based on the [necessity of a server certificate fingerpri…
-
https://chromestatus.com/feature/5124606246518784 discusses a new change, designed to prevent ossification, in which client hellos will be randomized, subject to the limits in the RFC.
It was origi…
-
### Actual behavior
Experienced that when trying to update an existing warninglist through API (Using PyMISP) the actual warninglist is not getting updated
### Expected behavior
When the POST is ma…
-
### Description
I have tested with 20+ different ja3 & their respective user agents with a new residential proxy everytime. I always get the same akamai_hash & akamai_text from (https://tls.peet.ws/a…
-
### Description
I have been using this library for a long time to bypass Cloudflares ja3 protection. It has been working without any problems.
But when I tried it recently, CycleTLS is not fooling C…
buzzy updated
8 months ago
-
Hey team, It's being almost an year i have been using an HTTP Toolkit and quite recently @pimterry written a blog on [Fighting TLS fingerprinting with Node.js](https://httptoolkit.com/blog/tls-fingerp…
-
Similar to https://github.com/alphasoc/nfr/issues/71.
Reading the documentation, Bro doesn't have JA3 values in their `ssl.log` officially. I need to ask Corelight about this and get the data forma…
-
Hi
We spoke on: https://github.com/go-rod/rod/issues/162
A. Do you plan on adding canvas evasion?
B. JA3 fingerprinting evasion (it becomes easier and easier to validate it, and going forward I t…
-
Hey, guys!
Seeing an issue with AWS Network Firewall ingest pipeline specifically on the JSON processor. Using `aws` package version 1.29.0.
Example AWS Network Firewall log
```
{"firewall_nam…
-
Many web firewall applications like Cloudflare implemented new anti DDoS system based on TLS Fingerprinting,
they are whitelisting of up-to-date browsers , we can not send http/s requests to servers…