High-performance network orchestration engine for protocol research & client emulation.
Move beyond the rigid defaults of standard libraries.
Architect gives you surgical control over TLS, HTTP/2, and TCP/IP — down to the byte.
Most HTTP clients are black boxes. You send a request; something happens on the wire; you get a response. Architect exposes everything in between.
By separating a clean Python API from a specialized Go sidecar, Architect lets you precisely control:
- 🔐 TLS fingerprints — spoof or study JA3/JA4 signatures with native uTLS
- 📡 HTTP/2 internals — frame ordering, header normalization, SETTINGS parameters
- 🌐 OS-level TCP stack — TTL, window size, and ECH for deep emulation fidelity
- 🍪 Session state — cookie-aware persistence + TLS session resumption
|
Full control over HTTP/2 header normalization and frame ordering to match specific client specifications (Chrome, Firefox, Safari, curl…) |
Native uTLS integration for accurate JA3 / JA4 fingerprinting and Encrypted Client Hello (ECH) testing. |
|
Granular TTL and TCP Window Size adjustment for operating system-level emulation. |
Built-in cookie-aware sessions and TLS session resumption across requests. |
| Feature | Detail |
|---|---|
| ⚡ Zero-dependency core | Pre-compiled Go binaries ship with the package — no Go toolchain needed |
| 🔄 Async-first | Designed from the ground up for asyncio and high-scale concurrency |
| 🛠️ Full HTTP methods | GET POST PUT DELETE PATCH HEAD OPTIONS |
| 🔍 Deep visibility | Real-time engine logs expose every handshake, frame, and negotiation |
| 🔀 Flexible proxying | SOCKS5 & HTTP proxies with per-session isolated connection pools |
pip install architect-netRequirements: Python 3.10+
import asyncio
import architect
async def main():
# Emulate a Chrome 124 network environment
session = architect.AsyncSession(architect.CHROME_124)
response = await session.get("https://tls.peet.ws/api/all")
if response.status_code == 200:
data = response.json()
print(f"✅ Verified JA3 Hash: {data['tls']['ja3_hash']}")
asyncio.run(main())Define your own network fingerprint for granular testing and research:
import architect
RESEARCH_PROFILE = {
"ID": "custom_research_node",
"TLSID": 1, # Maps to an internal TLS profile
"TTL": 128, # Custom hop limit (128 = Windows)
"TCPWindow": 65535, # Initial TCP window size
"UserAgent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64)..."
}
async def run_test():
# AsyncClient is stateless — no session/cookie persistence
client = architect.AsyncClient(profile=RESEARCH_PROFILE)
response = await client.get("https://tls.peet.ws/api/all")
print(response.json())📋 Profile field reference
| Field | Type | Description |
|---|---|---|
ID |
str |
Human-readable identifier for this profile |
TLSID |
int |
Index into internal TLS client hello profiles |
TTL |
int |
IP time-to-live value (64 = Linux, 128 = Windows) |
TCPWindow |
int |
Initial TCP receive window size |
UserAgent |
str |
HTTP User-Agent header value |
AsyncSession |
AsyncClient |
|
|---|---|---|
| Cookie persistence | ✅ Yes | ❌ No |
| TLS session resumption | ✅ Yes | ❌ No |
| Stateless requests | ❌ | ✅ Yes |
| Best for | Multi-request flows, login flows | One-off probes, benchmarking |
Architect is built for authorized security research, protocol analysis, and educational use. It exists to help engineers understand network behavior and build more resilient systems.
⚠️ Users are solely responsible for ensuring their use of this tool complies with all applicable laws and ethical standards. Do not use Architect against systems you do not own or have explicit permission to test.
Contributions, issues, and feature requests are welcome! Check the issues page to get started.