This HTTP tunnel proxy is designed to serve both HTTP/1.1 and HTTP/2 requests over TCP while randomizing its TLS fingerprint to evade scraper blocking through TLS fingerprinting techniques.
-
HTTP/1.1 and HTTP/2 Support: This proxy supports both HTTP/1.1 and HTTP/2 protocols, making it versatile for various web applications.
-
Randomized TLS Fingerprint: The proxy continuously randomizes its TLS fingerprint, making it difficult scraper detection to identify and block based on TLS fingerprinting.
-
TCP Tunneling: The proxy tunnels traffic over TCP, ensuring robust and reliable communication.
-
Clone this repository to your server:
git clone https://github.com/Deathwalker9959/native-http-proxy.git
-
Navigate to the project directory:
cd native-http-proxy
-
Install the required dependencies:
go get
-
Install as binary
go install native-http-proxy
-
Start the HTTP tunnel proxy:
./native-http-proxy --port 8080
-
Configure your client to use the proxy. Ensure that you point your client to the correct proxy server address and port.
-
Enjoy seamless HTTP/1.1 and HTTP/2 traffic while evading scraper blocking!
You can customize the behavior of the HTTP tunnel proxy by modifying the commandline arguements. Here are some of the available configuration options:
port
: The port on which the proxy server listens.
Make sure to review and update the configuration to suit your specific requirements.
Contributions are welcome! If you want to contribute to this project, please follow these steps:
- Fork the repository.
- Create a new branch for your feature or bug fix.
- Make your changes and commit them.
- Create a pull request describing your changes.
This project is licensed under the MIT License - see the LICENSE file for details.
Feel free to use this HTTP tunnel proxy for your web scraping, data gathering, or other network-related projects. If you have any questions or encounter issues, don't hesitate to open an issue or reach out to us for support. Happy proxying!