Spoof TLS/JA3 fingerprints in GO and Javascript
-
Updated
Apr 28, 2026 - Go
Spoof TLS/JA3 fingerprints in GO and Javascript
An easy-to-use HTTP client to spoof TLS/JA3, HTTP2 and HTTP3 fingerprint
Passive request fingerprinting demo. Visit at tls.peet.ws / tls3.peet.ws
Fingerproxy is an HTTPS reverse proxy. It creates JA3, JA4, Akamai HTTP2 fingerprints, and forwards to backend via HTTP request headers.
Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act on them: block, reroute, tarpit, or deceive in real time.
🚀obtain the client's ja3 fingerprint, http2 fingerprint, and ja4 fingerprint
Mimic chromium's HTTP/HTTP2 and TLS implementations.
Introduction to JA3 Fingerprint and how to impersonate it.
HTTP proxy with per-request uTLS fingerprint mimicry and upstream proxy tunneling. Currently WIP.
TLS fingerprint emulation upstream proxy replay any ClientHello
A caddy plugin that gets JA3 TLS fingerprints from requests.
JA4 proxy tooling.
Human like HTTP Library powered by fpclient and tls_client.
Service to bypass Cloudflare TLS fingerptint with JA3 spoofing
Add a description, image, and links to the ja3 topic page so that developers can more easily learn about it.
To associate your repository with the ja3 topic, visit your repo's landing page and select "manage topics."