Mitm proxy that defends against TLS and JS worker fingerprinting.
Project description
Python Usage
Hazetunnel is designed to run globally:
import hazetunnel
hazetunnel.launch()
...
requests.get(
url='https://tls.peet.ws/api/clean',
headers={
**HeaderGenerator().generate(browser='chrome'),
'x-mitm-payload': 'alert("hi");'
},
proxies={'https': hazetunnel.url()},
verify=hazetunnel.cert()
)
...
hazetunnel.stop()
Although, Hazetunnel may also run in a context manager:
from hazetunnel import HazeTunnel
...
with HazeTunnel as proxy:
requests.get(
url='https://tls.peet.ws/api/clean',
headers={
**HeaderGenerator().generate(browser='chrome'),
'x-mitm-payload': 'alert("hi");'
},
proxies={'https': proxy.url},
verify=proxy.cert
)
...
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
hazetunnel-1.0.0.tar.gz
(4.5 kB
view hashes)
Built Distribution
Close
Hashes for hazetunnel-1.0.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | b9792738f79df4306a8b618eddd11f60a33353b667800e9de99c13370846929a |
|
MD5 | 2b2c9e5e031e3a4ebeee067d978180c9 |
|
BLAKE2b-256 | 329bdf603db4a930de0a16686859cda2683ec02eb9fa60044af65abe8fc391bb |