Show HN: I built an HTTP client that perfectly mimics Chrome 142
14 days ago
- #browser-fingerprinting
- #Python
- #HTTP-client
- Python HTTP client mimicking browser fingerprints with requests-compatible API.
- High performance with native C implementation and BoringSSL for HTTP/HTTPS.
- Supports HTTP/2 with ALPN negotiation via nghttp2.
- Perfect JA3N, JA4, and JA4_R fingerprint matching for Chrome 142.
- Includes realistic Chrome 142 browser profile and TLS fingerprinting.
- Features connection pooling and session management for persistent cookies and headers.
- Easy installation via pip with support for Python 3.8+ on Windows, macOS, and Linux.
- Simple API for GET, POST requests, sessions, and HTTP/2 support.
- Mimics browser behavior with pre-configured profiles and OS-specific user agents.
- Accurate Chrome 142 TLS fingerprints with post-quantum cryptography.
- Supports various HTTP features like custom headers, file uploads, timeouts, and authentication.
- High compatibility with Python's requests library for most use cases.
- Detailed response handling including status codes, headers, JSON parsing, and TLS info.
- Comprehensive error handling with specific exceptions for timeouts, connection errors, etc.
- Cross-platform support with BoringSSL for consistent TLS behavior.
- Development setup includes building from source with BoringSSL and nghttp2.
- Extensive test suite covering HTTP methods, fingerprint validation, and real-world scenarios.
- Open for contributions, especially in Windows compatibility, browser profiles, and performance.
- MIT licensed with a strong disclaimer for ethical and legal use only.