bstrdlord/ja3-spoof
http client for zig that spoofs tls/ssl ja3
A curl-based zig http client that can spoof tls/ssl ja3
zig fetch --save https://github.com/blockkwork/ja3-spoof/archive/refs/tags/[LATEST TAG].tar.gz
Example
zig fetch --save https://github.com/blockkwork/ja3-spoof/archive/refs/tags/0.0.1.tar.gz
Add to build.zig
const ja3_spoof = b.dependency("ja3_spoof", .{}).module("ja3_spoof");
exe.root_module.addImport("ja3_spoof", ja3_spoof);
Example in ./examples folder
Run with command:
make EXAMPLE
const client = ja3_spoof.init(.{
.allocator = allocator,
.custom_cookies = "Cookie",
.custom_user_agent = "ja3 spoof",
.custom_ciphers = "AES256-SHA",
}) catch |err| {
std.debug.print("error: {}\n", .{err});
return;
};
const response = client.send("https://tools.scrapfly.io/api/tls") catch |err| {
std.debug.print("error: {}\n", .{err});
return;
};
std.debug.print("status_code: {}\nresponse: {s}\n", .{ response.status_code, response.response });
To spoof ja3 you need to change .custom_ciphers to any other in Client Options