sleeyax / burp-awesome-tls

Burp extension to evade TLS fingerprinting. Bypass WAF, spoof any browser.
GNU General Public License v3.0
992 stars 66 forks source link

[Backend] Import net/x/http2 #9

Closed sleeyax closed 2 years ago

sleeyax commented 2 years ago

See: https://github.com/refraction-networking/utls/issues/16#issuecomment-624076510

sleeyax commented 2 years ago

Turns out Go is doing weird stuff, even causing ForceAttemptHttp2: true not to work properly with a custom UTLS based DialTLSContext. I was hoping to be able to use the h2_bundle directly to reduce the number of internal packages required to make this work but I guess I'll stick to my old method and just import and use the http2 package instead.