Browser fingerprint emulation HTTP client with HTTP/1.1, HTTP/2, and HTTP/3 support
Project description
HTTPCloak Python
Browser fingerprint emulation HTTP client with HTTP/1.1, HTTP/2, and HTTP/3 support.
Installation
pip install httpcloak
Quick Start
Synchronous Usage
from httpcloak import Session
# Create a session with Chrome fingerprint
session = Session(preset="chrome-143")
# Make requests
response = session.get("https://www.cloudflare.com/cdn-cgi/trace")
print(response.status_code)
print(response.text)
# POST request with JSON
response = session.post("https://api.example.com/data", json={"key": "value"})
# POST request with form data
response = session.post("https://api.example.com/form", data="field1=value1&field2=value2")
# Custom headers
response = session.get("https://example.com", headers={"X-Custom": "value"})
# With proxy
session = Session(preset="chrome-143", proxy="http://user:pass@host:port")
# Always close when done
session.close()
Context Manager (Recommended)
from httpcloak import Session
with Session(preset="chrome-143") as session:
response = session.get("https://example.com")
print(response.text)
# Session automatically closed
Asynchronous Usage
import asyncio
from httpcloak import Session
async def main():
session = Session(preset="chrome-143")
# Async GET
response = await session.get_async("https://example.com")
print(response.text)
# Async POST
response = await session.post_async("https://api.example.com/data", data={"key": "value"})
# Multiple concurrent requests
responses = await asyncio.gather(
session.get_async("https://example.com/1"),
session.get_async("https://example.com/2"),
session.get_async("https://example.com/3"),
)
session.close()
asyncio.run(main())
Fast Response Mode
For performance-critical applications, use get_fast() which returns a lightweight response:
from httpcloak import Session
with Session(preset="chrome-143") as session:
# Fast mode - minimal overhead
response = session.get_fast("https://example.com")
data = bytes(response.content) # Raw bytes
print(f"Status: {response.status_code}")
print(f"Size: {len(data)} bytes")
Streaming Downloads
For large downloads, use streaming to avoid loading entire response into memory:
from httpcloak import Session
with Session(preset="chrome-143") as session:
# Stream a large file
stream = session.get_stream("https://example.com/large-file.zip")
print(f"Status: {stream.status_code}")
print(f"Content-Length: {stream.content_length}")
# Read in chunks
with open("downloaded-file.zip", "wb") as f:
for chunk in stream.iter_content(65536): # 64KB chunks
f.write(chunk)
stream.close()
# Or use context manager
with Session(preset="chrome-143") as session:
with session.get_stream("https://example.com/large-file.zip") as stream:
total = 0
for chunk in stream.iter_content(65536):
total += len(chunk)
print(f"Downloaded {total} bytes")
Proxy Support
HTTPCloak supports HTTP, SOCKS5, and HTTP/3 (MASQUE) proxies with full fingerprint preservation.
HTTP Proxy
from httpcloak import Session
# Basic HTTP proxy
session = Session(preset="chrome-143", proxy="http://host:port")
# With authentication
session = Session(preset="chrome-143", proxy="http://user:pass@host:port")
# HTTPS proxy
session = Session(preset="chrome-143", proxy="https://user:pass@host:port")
SOCKS5 Proxy
from httpcloak import Session
# SOCKS5 proxy (with DNS resolution on proxy)
session = Session(preset="chrome-143", proxy="socks5h://host:port")
# With authentication
session = Session(preset="chrome-143", proxy="socks5h://user:pass@host:port")
response = session.get("https://www.cloudflare.com/cdn-cgi/trace")
print(response.protocol) # h3 (HTTP/3 through SOCKS5!)
HTTP/3 MASQUE Proxy
MASQUE (RFC 9484) enables HTTP/3 connections through compatible proxies:
from httpcloak import Session
# MASQUE proxy (auto-detected for known providers like Bright Data)
session = Session(preset="chrome-143", proxy="https://user:pass@brd.superproxy.io:10001")
response = session.get("https://www.cloudflare.com/cdn-cgi/trace")
print(response.protocol) # h3
Split Proxy Configuration
Use different proxies for TCP (HTTP/1.1, HTTP/2) and UDP (HTTP/3) traffic:
from httpcloak import Session
session = Session(
preset="chrome-143",
tcp_proxy="http://tcp-proxy:port", # For HTTP/1.1, HTTP/2
udp_proxy="https://masque-proxy:port" # For HTTP/3
)
Advanced Features
Encrypted Client Hello (ECH)
ECH encrypts the SNI (Server Name Indication) to prevent traffic analysis. Works with all Cloudflare domains:
from httpcloak import Session
# Enable ECH for Cloudflare domains
session = Session(preset="chrome-143", ech_config_domain="cloudflare-ech.com")
response = session.get("https://www.cloudflare.com/cdn-cgi/trace")
print(response.text)
# Output includes: sni=encrypted, http=http/3
Domain Fronting (Connect-To)
Connect to one server while requesting a different domain:
from httpcloak import Session
# Connect to example.com's IP but request www.cloudflare.com
session = Session(
preset="chrome-143",
connect_to={"www.cloudflare.com": "example.com"}
)
response = session.get("https://www.cloudflare.com/cdn-cgi/trace")
Combined: SOCKS5 + ECH
Get HTTP/3 with encrypted SNI through a SOCKS5 proxy:
from httpcloak import Session
session = Session(
preset="chrome-143",
proxy="socks5h://user:pass@host:port",
ech_config_domain="cloudflare-ech.com"
)
response = session.get("https://www.cloudflare.com/cdn-cgi/trace")
# Response shows: http=http/3, sni=encrypted
Cookie Management
from httpcloak import Session
session = Session()
# Set a cookie
session.set_cookie("session_id", "abc123")
# Get all cookies
cookies = session.get_cookies()
print(cookies)
# Access cookies as property
print(session.cookies)
# Delete a cookie
session.delete_cookie("session_id")
# Clear all cookies
session.clear_cookies()
session.close()
Session Configuration
from httpcloak import Session
session = Session(
preset="chrome-143", # Browser fingerprint preset
proxy=None, # Proxy URL
tcp_proxy=None, # Separate TCP proxy
udp_proxy=None, # Separate UDP proxy (MASQUE)
timeout=30, # Request timeout in seconds
http_version="auto", # "auto", "h1", "h2", "h3"
verify=True, # SSL certificate verification
allow_redirects=True, # Follow redirects
max_redirects=10, # Maximum redirect count
retry=3, # Retry count on failure
prefer_ipv4=False, # Prefer IPv4 over IPv6
auth=("user", "pass"), # Default basic auth
connect_to=None, # Domain fronting map
ech_config_domain=None # ECH config domain
)
Available Presets
from httpcloak import available_presets
print(available_presets())
# ['chrome-144', 'chrome-143', 'chrome-141', 'chrome-133',
# 'firefox-133', 'safari-18', 'ios-chrome-144', ...]
Response Object
Standard Response
response = session.get("https://example.com")
response.status_code # int: HTTP status code
response.headers # dict[str, list[str]]: Response headers (multi-value)
response.content # bytes: Raw response body
response.text # str: Response body as text
response.url # str: Final URL after redirects
response.protocol # str: Protocol used (h2, h3)
response.ok # bool: True if status < 400
response.elapsed # float: Request duration in seconds
response.cookies # list: Cookies from response
response.history # list: Redirect history
response.reason # str: Status reason phrase
# Get specific header
content_type = response.get_header("Content-Type")
all_cookies = response.get_headers("Set-Cookie")
# Parse JSON
data = response.json()
Fast Response
response = session.get_fast("https://example.com")
response.status_code # int: HTTP status code
response.headers # dict: Response headers
response.content # memoryview: Raw response body (zero-copy)
response.url # str: Final URL after redirects
response.protocol # str: Protocol used
Streaming Response
stream = session.get_stream("https://example.com")
stream.status_code # int: HTTP status code
stream.headers # dict[str, list[str]]: Response headers
stream.content_length # int: Content length (-1 if unknown)
stream.url # str: Final URL after redirects
stream.protocol # str: Protocol used
# Read all bytes
data = b"".join(stream.iter_content(65536))
# Read in chunks (memory efficient)
for chunk in stream.iter_content(65536):
process(chunk)
stream.close()
HTTP Methods
from httpcloak import Session
with Session(preset="chrome-143") as session:
# GET
response = session.get("https://example.com")
# POST
response = session.post("https://example.com", data="data")
response = session.post("https://example.com", json={"key": "value"})
# PUT
response = session.put("https://example.com", data="data")
# PATCH
response = session.patch("https://example.com", data="data")
# DELETE
response = session.delete("https://example.com")
# HEAD
response = session.head("https://example.com")
# OPTIONS
response = session.options("https://example.com")
# Custom method
response = session.request("CUSTOM", "https://example.com")
Error Handling
from httpcloak import Session, HTTPCloakError
try:
session = Session()
response = session.get("https://example.com")
except HTTPCloakError as e:
print(f"Request failed: {e}")
finally:
session.close()
Convenience Functions
For one-off requests without managing a session:
import httpcloak
# Simple GET
response = httpcloak.get("https://example.com")
print(response.text)
# With options
response = httpcloak.get(
"https://example.com",
headers={"X-Custom": "value"},
timeout=60
)
# POST
response = httpcloak.post("https://api.example.com", data={"key": "value"})
Local Proxy
Use LocalProxy to apply TLS fingerprinting to any HTTP client (requests, httpx, etc.).
HTTPS with True Streaming (Recommended)
For HTTPS requests with full fingerprinting AND true streaming (request/response bodies not materialized into memory), use the X-HTTPCloak-Scheme header:
from httpcloak import LocalProxy
import requests
# Start local proxy with Chrome fingerprint
proxy = LocalProxy(preset="chrome-143")
print(f"Proxy running on {proxy.proxy_url}")
# Use X-HTTPCloak-Scheme header for HTTPS with fingerprinting + streaming
response = requests.get(
"http://example.com/api", # Note: http://
proxies={"http": proxy.proxy_url}, # Use http proxy
headers={"X-HTTPCloak-Scheme": "https"} # Upgrades to HTTPS with fingerprinting
)
# This provides:
# - Full TLS fingerprinting (Chrome/Firefox JA3/JA4)
# - HTTP/3 support
# - True streaming (request body NOT materialized into memory)
# - Header modification capabilities
proxy.close()
Why use X-HTTPCloak-Scheme?
Standard HTTP proxy clients use CONNECT tunneling for HTTPS, which means the proxy can't inspect or modify the request. The X-HTTPCloak-Scheme: https header tells LocalProxy to:
- Accept the request as plain HTTP
- Upgrade it to HTTPS internally
- Apply full TLS fingerprinting
- Stream request/response bodies without memory materialization
Basic Usage
from httpcloak import LocalProxy
import requests
# Start local proxy with Chrome fingerprint
proxy = LocalProxy(preset="chrome-143")
# Standard HTTPS (uses CONNECT tunnel - fingerprinting via upstream proxy only)
response = requests.get("https://example.com", proxies={"https": proxy.proxy_url})
# Per-request upstream proxy rotation
response = requests.get(
"https://example.com",
proxies={"https": proxy.proxy_url},
headers={"X-Upstream-Proxy": "http://user:pass@rotating-proxy.com:8080"}
)
proxy.close()
TLS-Only Mode
When your client already provides authentic browser headers, use TLS-only mode:
from httpcloak import LocalProxy
# Only apply TLS fingerprint, pass headers through
proxy = LocalProxy(preset="chrome-143", tls_only=True)
# Your client's headers are preserved
response = requests.get(
"https://example.com",
proxies={"https": proxy.proxy_url},
headers={"User-Agent": "My Custom UA"}
)
proxy.close()
Session Registry
Route different requests through different browser fingerprints:
from httpcloak import LocalProxy, Session
proxy = LocalProxy(preset="chrome-143")
# Create sessions with different fingerprints
chrome_session = Session(preset="chrome-143")
firefox_session = Session(preset="firefox-133")
# Register sessions with the proxy
proxy.register_session("chrome-user", chrome_session)
proxy.register_session("firefox-user", firefox_session)
# Route requests using X-HTTPCloak-Session header
response = requests.get(
"https://example.com",
proxies={"https": proxy.proxy_url},
headers={"X-HTTPCloak-Session": "firefox-user"} # Uses firefox fingerprint
)
# Unregister when done
proxy.unregister_session("chrome-user")
proxy.unregister_session("firefox-user")
chrome_session.close()
firefox_session.close()
proxy.close()
LocalProxy Options
proxy = LocalProxy(
port=0, # Port (0 = auto-select)
preset="chrome-143", # Browser fingerprint
timeout=30, # Request timeout in seconds
max_connections=1000,# Max concurrent connections
tcp_proxy=None, # Default upstream TCP proxy
udp_proxy=None, # Default upstream UDP proxy
tls_only=False # TLS-only mode
)
proxy.port # Actual port number
proxy.proxy_url # Full proxy URL (http://127.0.0.1:port)
proxy.is_running # True if proxy is active
proxy.get_stats() # Returns dict with request/connection stats
proxy.close() # Stop the proxy
Platform Support
- Linux (x64, arm64)
- macOS (x64, arm64)
- Windows (x64, arm64)
- Python 3.8+
License
MIT
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distributions
Built Distributions
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file httpcloak-1.6.0b12-py3-none-win_amd64.whl.
File metadata
- Download URL: httpcloak-1.6.0b12-py3-none-win_amd64.whl
- Upload date:
- Size: 4.7 MB
- Tags: Python 3, Windows x86-64
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
212a78547f8128343c1f853fc1aac067620fa7a69b8dbe1aa847ce21b897e1a2
|
|
| MD5 |
66091e29099aef46bc50a9c9532a0712
|
|
| BLAKE2b-256 |
59ba769b309c76cf020cb32877b75e60b20128c74d17584dd7e8ffc5bbfecb88
|
File details
Details for the file httpcloak-1.6.0b12-py3-none-manylinux_2_17_x86_64.whl.
File metadata
- Download URL: httpcloak-1.6.0b12-py3-none-manylinux_2_17_x86_64.whl
- Upload date:
- Size: 4.9 MB
- Tags: Python 3, manylinux: glibc 2.17+ x86-64
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
80c55a90bd7761d22a35e881feae65ce2f08f79424bf4d8159e01e0d44c881cb
|
|
| MD5 |
8985313aef0f97cf21553dae73190bac
|
|
| BLAKE2b-256 |
897e32d60c87fe8f4cab5f37de5ea884e5dc8e5cc34b79cd9c1d142f8783aab4
|
File details
Details for the file httpcloak-1.6.0b12-py3-none-manylinux_2_17_aarch64.whl.
File metadata
- Download URL: httpcloak-1.6.0b12-py3-none-manylinux_2_17_aarch64.whl
- Upload date:
- Size: 4.5 MB
- Tags: Python 3, manylinux: glibc 2.17+ ARM64
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
8f9de544606ff91217fe403948cf76a876e1894d265efd1558a6d8acd063f1f8
|
|
| MD5 |
828b684d7d89d0c094c400df461694da
|
|
| BLAKE2b-256 |
20b0a5f51418c690457b7800a13bf5b97dc18ad60e88aa1e6f5ed3c2a33edc8b
|
File details
Details for the file httpcloak-1.6.0b12-py3-none-macosx_11_0_arm64.whl.
File metadata
- Download URL: httpcloak-1.6.0b12-py3-none-macosx_11_0_arm64.whl
- Upload date:
- Size: 4.3 MB
- Tags: Python 3, macOS 11.0+ ARM64
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
df9bb52fd19e09b2129e1c751feabc68a2272c61dfe3712cf9abfde2484abfd5
|
|
| MD5 |
17d723439c269bd66428749d4c1e0bc1
|
|
| BLAKE2b-256 |
e469c2c706fac77bd26fe19bbd2fffae73b1c60aee865d7fff8e6b4fe0076aed
|
File details
Details for the file httpcloak-1.6.0b12-py3-none-macosx_10_9_x86_64.whl.
File metadata
- Download URL: httpcloak-1.6.0b12-py3-none-macosx_10_9_x86_64.whl
- Upload date:
- Size: 4.6 MB
- Tags: Python 3, macOS 10.9+ x86-64
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
f0e6393f3d01e07d1b6c52d46fca474a1f53fa137077fa8a9a3659d5b0d094df
|
|
| MD5 |
84d7dc6786c747754a7187f8da5f8f39
|
|
| BLAKE2b-256 |
c1fa5ca82de6c84679ea77308e251df9168e0cc588a8939c4d2771fe1b6bd32f
|