Closed tocha688 closed 1 week ago
I've written some examples before in PR728
I mean setting TLS request fingerprint, ja3, ja4 verification, modifying some request features of tls, so as to fully simulate the browser request process
There are implementations for this.
@tttturtle-russ Thanks for adding a reference.
@tocha688 Please look at the example of Resty usage with spoofed-round-tripper https://github.com/juzeon/spoofed-round-tripper?tab=readme-ov-file#usage
How to set the fingerprint of tls, like this library, set tls as the browser fingerprint. Many websites detect tls interception simulation requests https://github.com/bogdanfinn/tls-client