Skip to main content

Ultra stealth HTTP library - Make your Python code invisible

Project description

๐Ÿ”’ ZIKZAKZIK

Ultra Stealth HTTP Library for Python

Make your code invisible. Zero dependencies. Maximum stealth.


๐Ÿš€ Features

โœ… Core Capabilities

  • Zero External Dependencies - Pure Python, no requests, no urllib3
  • Drop-in Replacement - Same API as requests library
  • Raw Socket Control - Direct TCP/IP implementation
  • SSL/TLS Support - Full HTTPS with fingerprint randomization

๐Ÿ•ต๏ธ Stealth Features

  • Request Flooding - Hide 1 real request in 100,000 decoys
  • Traffic Obfuscation - Polymorphic patterns, timing randomization
  • Browser Fingerprint Spoofing - Realistic user agents & headers
  • TLS Fingerprint Randomization - Evade SSL/TLS detection
  • Anti-Pattern Detection - Break predictable behavior

๐Ÿ” Security

  • Response Encryption - Optional encrypted responses
  • Memory-Safe Operations - No disk traces
  • HMAC Authentication - Verify data integrity
  • Steganography Support - Hide data in noise

โšก Performance

  • Async Support - Multi-threaded decoy generation
  • Configurable Profiles - Fast, Balanced, Paranoid, Stealth
  • Smart Caching - Optimized for repeated requests

๐Ÿ“ฆ Installation

pip install zikzakzik

That's it! Zero dependencies to install.


๐ŸŽฏ Quick Start

Basic Usage (Like requests)

import zikzakzik as zik

# Simple GET request
response = zik.get('https://api.example.com/data')
print(response.text)
print(response.status_code)

# POST with JSON
data = {'key': 'value'}
response = zik.post('https://api.example.com/users', json=data)
print(response.json())

# Custom headers
headers = {'Authorization': 'Bearer token123'}
response = zik.get('https://api.example.com/secure', headers=headers)

Advanced - Session with Profile

from zikzakzik import StealthSession

# Create session with stealth profile
session = StealthSession(profile='paranoid')

# This request is now hidden in 10,000 decoys!
response = session.get('https://api.example.com/data')

Migration from requests

# BEFORE
import requests
response = requests.get(url)

# AFTER (just change import!)
import zikzakzik as requests
response = requests.get(url)  # Now invisible!

โš™๏ธ Configuration Profiles

Fast (Minimal stealth, maximum speed)

session = StealthSession(profile='fast')
# 100 decoy requests, minimal delays

Balanced (Default - Good stealth, good speed)

session = StealthSession(profile='balanced')
# 1,000 decoy requests, moderate delays

Paranoid (Maximum stealth)

session = StealthSession(profile='paranoid')
# 10,000 decoy requests, encrypted responses

Stealth (EXTREME stealth)

session = StealthSession(profile='stealth')
# 50,000 decoy requests, maximum obfuscation

Custom Configuration

import zikzakzik as zik

zik.configure(
    decoy_count=5000,
    timing_randomization=True,
    encrypt_response=True
)

๐ŸŽ“ Use Cases

โœ… Legitimate Uses

  1. Web Scraping - Bypass anti-bot systems
  2. Security Research - Penetration testing (authorized)
  3. Privacy Protection - Personal data privacy
  4. API Testing - Load testing without detection
  5. Competitive Intelligence - Market research
  6. Academic Research - Security studies
  7. Censorship Bypass - Access restricted content

โŒ DO NOT USE FOR

  • Illegal hacking
  • DDoS attacks
  • Unauthorized access
  • Malicious activities
  • Violating ToS/laws

๐Ÿ“Š How It Works

Request Flow

Your Code
    โ†“
[ZIKZAKZIK]
    โ†“
Real Request (1) + Decoy Requests (10,000)
    โ†“
Randomized Headers, TLS Fingerprints, Timing
    โ†“
Target Server (Can't tell which is real!)
    โ†“
Response Extraction & Optional Encryption
    โ†“
Your Code (Clean response)

Detection Evasion Techniques

  1. Traffic Flooding - Drown real request in noise
  2. Header Randomization - Different headers each time
  3. TLS Fingerprint Variation - Evade SSL/TLS detection
  4. Timing Jitter - Break timing patterns
  5. Multi-Target Decoys - Requests to different domains
  6. Realistic Payloads - AI-like decoy data

๐Ÿ”ฌ Technical Details

Zero Dependencies

# Only uses Python standard library:
import socket      # Raw networking
import ssl         # TLS/SSL
import threading   # Concurrency
import hashlib     # Cryptography
import hmac        # Authentication
import random      # Randomization
import time        # Timing
import json        # Data handling
import base64      # Encoding

Pure Python HTTP Implementation

  • Raw TCP sockets
  • Manual HTTP request building
  • Chunked transfer encoding support
  • Connection pooling
  • SSL/TLS handshake

๐Ÿ›ก๏ธ Security Notice

This tool is powerful. Use responsibly.

# โœ… GOOD - Authorized testing
session = StealthSession()
response = session.get('https://my-own-api.com/test')

# โŒ BAD - Unauthorized access
# DON'T DO THIS

Legal Disclaimer:

  • Only use on systems you own or have permission to test
  • Respect website ToS and robots.txt
  • Follow local laws and regulations
  • Author is not responsible for misuse

๐Ÿ“ˆ Performance Benchmarks

Profile Decoys Speed Stealth Use Case
Fast 100 โšกโšกโšกโšกโšก ๐Ÿ”’๐Ÿ”’ Quick scraping
Balanced 1,000 โšกโšกโšกโšก ๐Ÿ”’๐Ÿ”’๐Ÿ”’๐Ÿ”’ General use
Paranoid 10,000 โšกโšกโšก ๐Ÿ”’๐Ÿ”’๐Ÿ”’๐Ÿ”’๐Ÿ”’ High security
Stealth 50,000 โšกโšก ๐Ÿ”’๐Ÿ”’๐Ÿ”’๐Ÿ”’๐Ÿ”’๐Ÿ”’ Maximum stealth

๐Ÿค Contributing

Contributions welcome! Please:

  1. Fork the repository
  2. Create feature branch
  3. Add tests
  4. Submit pull request

๐Ÿ“„ License

MIT License - See LICENSE file


๐ŸŽฏ Why ZIKZAKZIK?

  • ZIK - Zigzag pattern (evasion)
  • ZAK - Attack/Action (stealth operations)
  • ZIK - Zigzag back (return safely)

The name represents the zigzag evasion pattern used to hide your real traffic!


๐Ÿ”ฅ Examples

Example 1: Simple Scraping

import zikzakzik as zik

# Scrape without getting banned
for page in range(1, 100):
    url = f'https://example.com/products?page={page}'
    response = zik.get(url)
    # Process data...

Example 2: API with Authentication

from zikzakzik import StealthSession

session = StealthSession(profile='balanced')

# Login
login_data = {'username': 'user', 'password': 'pass'}
response = session.post('https://api.example.com/login', json=login_data)
token = response.json()['token']

# Authenticated requests
headers = {'Authorization': f'Bearer {token}'}
response = session.get('https://api.example.com/data', headers=headers)

Example 3: Maximum Stealth

from zikzakzik import StealthSession

# Create ultra-stealth session
session = StealthSession(profile='stealth')

# 50,000 decoy requests will be generated
# Response will be encrypted
response = session.get('https://sensitive-api.com/data')

# Response is automatically decrypted
print(response.json())

๐Ÿ“š API Reference

Module Functions

  • get(url, **kwargs) - HTTP GET
  • post(url, **kwargs) - HTTP POST
  • put(url, **kwargs) - HTTP PUT
  • delete(url, **kwargs) - HTTP DELETE
  • patch(url, **kwargs) - HTTP PATCH
  • head(url, **kwargs) - HTTP HEAD
  • options(url, **kwargs) - HTTP OPTIONS
  • request(method, url, **kwargs) - Generic request

Classes

  • StealthSession(profile='balanced') - Session with stealth features
  • StealthResponse - Response object

Configuration

  • set_profile(name) - Set global profile
  • get_profile() - Get current profile
  • configure(**kwargs) - Custom settings

๐Ÿ’ฌ Support


๐ŸŒŸ Star History

If you find this useful, please โญ star the repo!


Made with ๐Ÿ”ฅ by DAXX

Remember: With great power comes great responsibility! ๐Ÿ•ท๏ธ

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

zikzakzik-1.0.0.tar.gz (27.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

zikzakzik-1.0.0-py3-none-any.whl (24.0 kB view details)

Uploaded Python 3

File details

Details for the file zikzakzik-1.0.0.tar.gz.

File metadata

  • Download URL: zikzakzik-1.0.0.tar.gz
  • Upload date:
  • Size: 27.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.14

File hashes

Hashes for zikzakzik-1.0.0.tar.gz
Algorithm Hash digest
SHA256 c8b3a4f99e663974430063010256923cbf5d1d0cc64167434570962984314e15
MD5 08f8ae55cadc6fa23b347ff14d9fdbae
BLAKE2b-256 143fc2828a73a9f0d9039f805059a9adfb4bdd1684ccaee72ed4f4e8ce03a909

See more details on using hashes here.

File details

Details for the file zikzakzik-1.0.0-py3-none-any.whl.

File metadata

  • Download URL: zikzakzik-1.0.0-py3-none-any.whl
  • Upload date:
  • Size: 24.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.14

File hashes

Hashes for zikzakzik-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 4c0798c12052aa66b4f42ab2ef82e773fe7522e186521f1c4202ae0f250b2920
MD5 16519ba46629cff0e007dededb18b231
BLAKE2b-256 b0c90c95be70edef35e58e5d771a4c1e753939f1496653c962b4b73af634f3f9

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page