This project aims at anti-fingerprinting programming, it consists of the following components:
[ ] Collector
It collects and records fingerprints from requests, currently it's based on TrackMe, fingerproxy, and clienthellod.
[ ] Automation
It sends requests to Collector automatically from the most popular platforms and browsers, with the help of container/vm/emulator or other technologies.
The collected fingerprints can be found in the assets branch.
[x] Windows (win10x64 and win11x64 running in dockur/windows)
[x] Chrome
[x] Firefox
[x] Edge
macOS
[ ] Safari
Android
[ ] Webview
[ ] Chrome
[ ] Sansung Internet
[ ] UC
iOS
[ ] Safari
[x] Modifier
[ ] Generator
It generate code for Modifier from the collected fingerprints, or provide it as a library for dynamic usage.
https://en.wikipedia.org/wiki/Usage_share_of_web_browsers#Summary_tables
https://www.fastly.com/blog/a-first-look-at-chromes-tls-clienthello-permutation-in-the-wild
https://github.com/google/boringssl/commit/e9c5d72c09e01a0f71f30f7c3454e5e7f8711476
https://github.com/chromium/chromium/commit/08631bdfddaad0f25c62261734171674a9621484
https://github.com/chromium/chromium/commit/8249eb7a1d2118bf9a6998c11964bae4c5db8b10
https://github.com/chromium/chromium/commit/4493a1eb4595194a262617589c5a265de40e203e
https://medium.com/cu-cyber/impersonating-ja3-fingerprints-b9f555880e42