Perfect TLS forwarding calls break through the JA3 check
陈不不
Posted on June 19, 2024
Use the same as requests.
The project fully emulates the TLS fingerprint of the browser.
Project address
https://github.com/2833844911/passja3/
Test examples (CloudFlare)
from cytls import cytls
headers = {
"sec-ch-ua": '"Google Chrome";v="125", "Chromium";v="125", "Not.A/Brand";v="24"',
"accept-language": 'en-US,en;q=0.9',
"upgrade-insecure-requests": "1",
"sec-ch-ua-mobile": "?0",
"User-Agent": 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36',
"accept": 'text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7',
"priority": "u=0, i",
"sec-ch-ua-platform": '"Windows"',
"Sec-Fetch-Site": "same-origin",
"Sec-Fetch-Mode": "cors",
"Sec-Fetch-Dest": "empty",
"Accept-Encoding": "gzip, deflate, br, zstd",
}
proxies = {"https": "http://user:passwd@255.255.255:8888"}
url = "https://www.utmel.com/productdetail/texasinstruments-tps63802dlar-7758755"
req = cytls.get(url, headers=headers, proxies=proxies, allow_redirects=True)
dt = req.text
print(req.status_code)
print(req.headers)
print(dt)
outcome
💖 💪 🙅 🚩
陈不不
Posted on June 19, 2024
Join Our Newsletter. No Spam, Only the good stuff.
Sign up to receive the latest update from our blog.
Related
githubcopilot AI Innovations at Microsoft Ignite 2024 What You Need to Know (Part 2)
November 29, 2024