Skip to content

zhkl0228/impersonator

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

49 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

impersonator

impersonator is a fork of BouncyCastle-bctls and okhttp that is designed to impersonate TLS fingerprints.

impersonator can impersonate browsers' TLS/JA3 and HTTP/2 fingerprints. If you are blocked by some website for no obvious reason, you can give impersonator a try.

Features

  • Supports TLS/JA3/JA4 fingerprints impersonation.
  • Supports HTTP/2 fingerprints impersonation.

Usage

TLS/JA3/JA4 fingerprints impersonation

<dependency>
    <groupId>com.github.zhkl0228</groupId>
    <artifactId>impersonator-bctls</artifactId>
    <version>1.0.8</version>
</dependency>

TLS/JA3/JA4 fingerprints and HTTP/2 fingerprints impersonation

<dependency>
    <groupId>com.github.zhkl0228</groupId>
    <artifactId>impersonator-okhttp</artifactId>
    <version>1.0.8</version>
</dependency>
ImpersonatorApi api = ImpersonatorFactory.ios();
SSLContext context = api.newSSLContext(null, null); // for TLS/JA3/JA4 fingerprints impersonation

OkHttpClientFactory factory = OkHttpClientFactory.create(api);
OkHttpClient client = factory.newHttpClient(); // for TLS/JA3/JA4 fingerprints and HTTP/2 fingerprints impersonation

About

Spoof TLS/JA3/JA4 and HTTP/2 fingerprints in Java

Resources

Stars

Watchers

Forks

Packages

No packages published