This project aims at anti-fingerprinting programming, it consists of the following components:
-
It collects and records fingerprints from requests, currently it's based on TrackMe, fingerproxy, and clienthellod.
- HTTP/2
- TLS
- QUIC
- TCP/IP
-
Automation
It sends requests to Collector automatically from the most popular platforms and browsers, with the help of container/vm/emulator or other technologies.
The collected fingerprints can be found in the assets branch.-
Windows (win10x64 and win11x64 running in dockur/windows)
- Chrome
- Firefox
- Edge
-
macOS
- Safari
-
Android
- Webview
- Chrome
- Sansung Internet
- UC
-
iOS
- Safari
-
-
Modifier
-
Generator
It generate code for Modifier from the collected fingerprints, or provide it as a library for dynamic usage.
- HTTP/2
- TLS
- QUIC
-
https://en.wikipedia.org/wiki/Usage_share_of_web_browsers#Summary_tables
-
https://www.fastly.com/blog/a-first-look-at-chromes-tls-clienthello-permutation-in-the-wild
-
https://github.com/google/boringssl/commit/e9c5d72c09e01a0f71f30f7c3454e5e7f8711476
-
https://github.com/chromium/chromium/commit/08631bdfddaad0f25c62261734171674a9621484
-
https://github.com/chromium/chromium/commit/8249eb7a1d2118bf9a6998c11964bae4c5db8b10
-
https://github.com/chromium/chromium/commit/4493a1eb4595194a262617589c5a265de40e203e
-
https://medium.com/cu-cyber/impersonating-ja3-fingerprints-b9f555880e42