Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

HTTP proxy with per-request uTLS fingerprint mimicry and upstream proxy tunneling. Currently WIP.

License

Notifications You must be signed in to change notification settings

rosahaj/tlsproxy

Repository files navigation

tlsproxy

HTTP proxy with per-request uTLS fingerprint mimicry and upstream proxy tunneling. Currently WIP.

Built on top of uTLS and goproxy. Inspired by ja3proxy.

Usage

Building from source

git clone https://github.com/rosahaj/tlsproxy
cd ja3proxy
go build
# Start proxy
./tlsproxy -client Chrome-120
# Make requests
curl --cacert cert.pem --proxy http://localhost:8080 https://www.example.com

Pre-built binaries are available in the Releases section.

Using docker CLI

docker run \
 -v ./credentials:/app/credentials \
 -p 8080:8080 \
 ghcr.io/rosahaj/tlsproxy:latest \
 -cert /app/credentials/cert.pem \
 -key /app/credentials/key.pem \
 -client Chrome-120

Using docker compose

See compose.yaml

docker compose up -d

CLI usage

Usage of ./tlsproxy:
 -addr string
 Proxy listen address
 -cert string
 TLS CA certificate (generated automatically if not present) (default "cert.pem")
 -client string
 Default utls clientHelloID (can be overriden through x-tlsproxy-client header) (default "Chrome-120")
 -key string
 TLS CA key (generated automatically if not present) (default "key.pem")
 -port string
 Proxy listen port (default "8080")
 -upstream string
 Default upstream proxy prefixed by "socks5://" (can be overriden through x-tlsproxy-upstream header)
 -verbose
 Enable verbose logging

About

HTTP proxy with per-request uTLS fingerprint mimicry and upstream proxy tunneling. Currently WIP.

Topics

Resources

License

Stars

Watchers

Forks

Packages

AltStyle によって変換されたページ (->オリジナル) /