-
Hey team, It's being almost an year i have been using an HTTP Toolkit and quite recently @pimterry written a blog on [Fighting TLS fingerprinting with Node.js](https://httptoolkit.com/blog/tls-fingerp…
-
Similar https://github.com/awslabs/s2n/issues/607, Having access to raw ClientHello can be useful for fingerprinting clients [1] for further analysis.
Plus, With raw ClientHello message, we could als…
-
**Checklist**
* [x] I've searched the issue tracker for similar requests
I believe there are some related issues on the tracker, but none of them fully describe the specific use-case I have in min…
-
Hey Team, We are using http toolkit from last 1 year and This is the best tool we can have, It does for what it is built.
Recently i saw 1 blog post regarding TLS [Fingerprinting](https://httptoolkit…
-
### Version of the software
0.2.4
### Operating system
Windows Server 2019
### Browser / Native
Chrome
### What happened?
According to https://github.com/salesforce/ja3
> JA3 i…
ghost updated
3 weeks ago
-
### TLS client version
v1.3.12
### System information
windows10,64
### Issue description
![微信截图_20240627004657](https://github.com/bogdanfinn/tls-client/assets/48446617/cd52547d-f8be-4a90-89be-90…
-
-
The issue of fingerprinting our TLS stack is still present on arm devices.
-
Is JA4 algorithm supposed to work with DTLS traffic too?
I am asking beacsue:
1) I didn't find any reference at all at DTLS in this repository
2) Wireshark doesn't calculate JA4 fingerprint for DT…
-
Hi, I'm wondering if it is possible to add a custom ja3 spoofing feature which would allow the user to use a custom ja3 fingerprint in the request block.