sleeyax / burp-awesome-tls

Burp extension to evade TLS fingerprinting. Bypass WAF, spoof any browser.
GNU General Public License v3.0
1.19k stars 75 forks source link

added custom hex client hello field back #64

Closed nabil-ak closed 6 months ago

nabil-ak commented 6 months ago

Closes #63

I added the custom hex client hello field back, so people can still set their own hello client if the interceptor proxy is not correctly working.

If the field is empty it will use the interceptor, if the interceptor is disabled it will use the default fingerprint selected by the drop-down menu.