zhkl0228 / impersonator

Spoof TLS/JA3/JA4 and HTTP/2 fingerprints in Java
15 stars 4 forks source link

Push Update #2

Open GramDev1 opened 3 weeks ago

GramDev1 commented 3 weeks ago

Hi, Could you push a release so that https://github.com/zhkl0228/impersonator/issues/1 becomes usable?

GramDev1 commented 3 weeks ago

Currently using a Gradle implementation with jitpack.

 api('com.github.zhkl0228:impersonator:59492b9b9c') {
        exclude group: 'com.github.zhkl0228.impersonator', module: 'impersonator-okhttp'
    }

Using the provided OKHTTP artifact causes issues, using their own fixes it. However the bouncy castle implementation (Which I commend you for making!,) does not support concurrency well :/

zhkl0228 commented 3 weeks ago

https://github.com/zhkl0228/impersonator/tree/v1.0.8

GramDev1 commented 3 weeks ago

Thanks! This does work, though at higher throughput (1000 threads or greater, can be tested with Executors.newFixedThreadPool(),) there are quite a few handshake errors. Error reading tls client hello at 40 I believe, I'll find it exactly.

Was this built with concurrency in mind?